A wide range of techniques used to keep you and your personal information safe online.
What is cybersecurity?
This is a type of software that is used to damage or disrupt a system.
What is malware?
Unauthorized intrusion in a system or a network
What is hacking
The most common social engineering attack.
What is phishing?
The replication of human intellectual processes by machines, particularly computer system
What is artificial intelligence
True or False: Using one strong password is better than using many strong passwords.
What is false?
A malicious software that holds a computer hostage until a sum of money is paid.
What is ransomware?
a technique used for collecting as much information as possible about the targeted network/system/victim to execute a successful cyber attack
What is footprinting?
Phishing attacks that target a specific, high-profile person.
What is whaling?
These are some of the ways that AI can help us in our lives
What is needing AI because it help us solve complex problems and enhance our health
This security technique makes use of a third party application to authorize your ability to login i.e. using your phone number to login after inputting your password.
What is two-factor authentication?
A type of malicious software that is used to spy on the target.
What is spyware?
name 3 hacker hat
What is _?
white hat hackers, black hat hackers, Gray hat hackers
A type of social engineering attack in which scammers lure victims into providing sensitive information by promising them something valuable in return.
What is baiting?
Name 3 artificial intelligence techniques
What is machine learning, computer vision, natural language processing
This type of scam is known for pretending to be an important email. It is used to get sensitive information out of the target.
What is phishing?
This is one of the main ways that malware is put on someone's computer.
What is malicious links and downloads?
involves an authorized attempt to gain unauthorized access to a computer system, application, or data.
What is ethical hacking
A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
What is a honeytrap?
This hacking technique makes use of AI to crack into systems.
What is AI weakness scanning?
3 cybersecurity techniques you could make use of for your protection.
What is __, __, and __?
Could include: strong passwords, anti-virus protection, avoiding sketchy emails, using more than one password, avoiding unknown links, etc.
These are just 3 of the ways that your PC could be harmed when malware is downloaded to it.
What is __?
Could include: file deletion, files moving without the users input, unknown files appearing on the PC, systems being damaged, applications being corrupted, etc.
a broad range of methods majorly intended by the people who want to hack other people’s data or make them do a specific task to benefit the hacker.
What is a social engineering attack
This attack promises something in exchange for information. This benefit usually assumes the form of a service
What is quid pro quo?
Examples of ways AI can keep a security system secured.
What is __?
Could include: Vulnerability scans, threat detection, threat assessment, etc.