FBI stands for
FBI - Federal Bureau of Investigation
A fake or nickname used for something, like a shortcut name for an email or file.
Alias
This famous operating system from Microsoft has been a target for hackers since the 1990s.
Windows
This kind of software is designed to protect your computer from viruses and other malicious programs.
Antivirus Software
Cybersecurity is all about protecting these three things: computers, networks, and ___.
Data
DOD stands for
DOD - Department of Defense
A device that sends internet to all the computers and devices in your house or school.
Router
many schools moved to online learning because of the pandemic, and hackers took advantage of this to attack school systems. What year did this happen?
2020
This word describes a message or email that looks real but tries to trick you into clicking a bad link.
phishing
This word means making sure a person is who they say they are
authentication
NASA stands for
NASA - National Aeronautics and Space Administration
A security system that controls incoming and outgoing network traffic based on rules to block unauthorized access.
Firewall
This German rocket scientist helped start the Marshall Center and led the U.S. space program.
Wernher von Braun
Hackers use this type of software to steal personal information, often without you knowing it.
Spyware
The 3 parts of the CIA triad are
Confidentiality
Integrity
Availability
NSA stands for
NSA - National Security Agency
A secret way into a computer system that someone can use to get around the normal security.
Backdoor
This well-known video game platform, which has millions of young users, was hacked in 2022, affecting many players' accounts.
Roblox
This type of attack floods a website with fake traffic, causing it to crash and stop working.
Denial of Service
A “white hat hacker” is a hacker who uses their skills for ___.
Good
PCRM stands for
PCRM - Privacy and Cybersecurity Risk Management Office
The very first version of the internet, made a long time ago to help scientists and the military share information.
ARPANET
The famous Y2K bug, which worried people about computer problems at the start of the new millennium, happened in this year.
2000
Hackers use this trick to hide malware or malicious code inside a harmless-looking file or program.
Trojan Horse
Before it became part of NASA, the Marshall Space Flight Center site was originally used by the U.S. Army to develop this type of weapon.
Rockets (or missiles)