Personal Protection
Malicious Hardware
Hackers
Social Engineering
Artificial Intelligence/AI
100

A wide range of techniques used to keep you and your personal information safe online.

What is cybersecurity?

100

This is a type of software that is used to damage or disrupt a system.

What is malware?

100

Unauthorized intrusion in a system or a network

What is hacking

100

The most common social engineering attack.

What is phishing?

100

The replication of human intellectual processes by machines, particularly computer system

What is artificial intelligence

200

True or False: Using one strong password is better than using many strong passwords.

What is false?

200

A malicious software that holds a computer hostage until a sum of money is paid.

What is ransomware?

200

a technique used for collecting as much information as possible about the targeted network/system/victim to execute a successful cyber attack

What is footprinting?

200

Phishing attacks that target a specific, high-profile person.

What is whaling?

200

These are some of the ways that AI can help us in our lives

What is needing AI because it help us solve complex problems and enhance our health

300

This security technique makes use of a third party application to authorize your ability to login i.e. using your phone number to login after inputting your password.

What is two-factor authentication?

300

A type of malicious software that is used to spy on the target.

What is spyware?

300

name 3 hacker hat

What is _? 

white hat hackers, black hat hackers, Gray hat hackers

300

A type of social engineering attack in which scammers lure victims into providing sensitive information by promising them something valuable in return.

What is baiting?

300

Name 3 artificial intelligence techniques

What is machine learning, computer vision, natural language processing

400

This type of scam is known for pretending to be an important email. It is used to get sensitive information out of the target.

What is phishing?

400

This is one of the main ways that malware is put on someone's computer.

What is malicious links and downloads?

400

involves an authorized attempt to gain unauthorized access to a computer system, application, or data.

 What is ethical hacking

400

A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.

What is a honeytrap?

400

This hacking technique makes use of AI to crack into systems.

What is AI weakness scanning?

500

3 cybersecurity techniques you could make use of for your protection.

What is __, __, and __?

Could include: strong passwords, anti-virus protection, avoiding sketchy emails, using more than one password, avoiding unknown links, etc.

500

These are just 3 of the ways that your PC could be harmed when malware is downloaded to it.

What is __?

Could include: file deletion, files moving without the users input, unknown files appearing on the PC, systems being damaged, applications being corrupted, etc.

500

a broad range of methods majorly intended by the people who want to hack other people’s data or make them do a specific task to benefit the hacker.

What is a social engineering attack

500

This attack promises something in exchange for information. This benefit usually assumes the form of a service

What is quid pro quo?

500

Examples of ways AI can keep a security system secured.

What is __?

Could include: Vulnerability scans, threat detection, threat assessment, etc.


M
e
n
u