Physical or Digital
CIA Triad
Soft Skills/Tech Skills
Cyberattacks
Grab Bag
100

The teacher locks the computers in a storage closet at the end of the day

Physical

100

__ is protection against unauthorized access or misuse of information


Confidentiality

100

Asking for feedback is an example of

Soft skills

100

This cyberattack involves sending out a lot of emails pretending to be someone else, like a bank or big company like Amazon or Best Buy

phishing

100

The intersection between confidentiality, integrity, and availability can be represented by this kind of graphic device

Venn Diagram

200

To visit my island in Animal Crossing, you need to have the Dodo Code (a special password that is new each time you visit)

Digital

200

___ is protection against unauthorized alteration of information

Integrity

200

A ___ examines code for the parts that have been changed by a hacker. 

a) programmer

b) mathematician

c) linguist

a) programmer

200

This attack involves a network of computers that has been taken over and is being controlled

botnets

200

This is a good tool to spread awareness on a social media site

A hashtag

300

My ring doorbell alerts me when someone is on my porch

Physical- deters intruders because of camera

Digital- provides an alert & digital record

300

___ refers to who has access to what tools/data at what time

Accessibility

300

A ___ detects language patterns in encoded materials.


a) political scientist

b) programmer

c) linguist

c) linguist

300

This attack prevents legitimate users from accessing a device or system

denial of service

300

Who is the most responsible for your cybersecurity?

You!

400

A smart lock that is connected to Amazon Alexa

Physical - the lock

Digital - Alexa/wifi connection

400

Leslie is very careful to make sure her social media profiles are all set to private, and that her friends never tag her in their public posts. She is concerned about the ___ of her information.

Accessibility

400

A ___ understands what regions in the world might be interested in developing a cyberattack.


a) mathematician

b) linguist

c) political scientist

c) political scientist

400

In this attack, hackers collect information from messages that are sent across a network without the sender or recipient realizing what is going on

eavesdropping

400

How many open cybersecurity jobs were there this year in the world?

3 million!

500

A guard dog protecting a herd of goats

Physical

500

Jose says he will never post anything that contains his geolocation tag, and puts his photos through a special "scrubber" program before he posts them on social media. This is a good strategy that focuses on protecting the location's _______.

Confidentiality

500

Imagine you are working on a group project but you have a group member who has not contributed any work and is not responding to the group text.

What kind of approach would demonstrate strong soft skills?

a) Take their editing permissions away and kick them out of the group chat

b) Ask the teacher to move them out of the group

c) Ask the teacher for advice

d) Ignore them and finish the project without them

c) ask the teacher for advice

500

In this attack, code is injected into a database through a form (like a login form) and the information stored in the database is leaked out

SQL Injection

500

There’s a one-story house in which everything is yellow. 

Yellow walls, yellow doors, yellow furniture. 

What color are the stairs?

There are no stairs, it's a one story house!

M
e
n
u