1
2
3
4
5
100

“I’m the secret door that asks your name,
Type me right to join the game.”

USERNAME

100

“I live in your phone, both day and night,
Update me often to keep things right.”

SOFTWARE

100

“I’m the tiny code that sneaks inside,
Causing trouble you can’t hide.”

MALWARE

100

“I’m the guard who watches the gate,
Allowing users who authenticate.”

Security System

100

“I keep things secret when they go online,
Without me, your info’s mine.”

Encryption

200

“I close the holes that let attackers creep,
Apply me fast — I patch what’s weak.”

Patch

200

“I wrap your traffic in a private lane,
Hide your IP so snoops can’t gain.”

VPN

200

“I prove the site you see is truly right,
Signed by others to earn your sight.”

Certificate

200

“I ask you to click the hard-to-read art,
Show you’re human before you start.”

CAPTCHA

200

“I run unknown code in a tiny room,
So the real system avoids the doom.”

Sandbox

300

“I’m the fake webpage you think is true,
Type your password — I’ll steal it from you.”

Phishing Site

300

“I copy your keystrokes one by one,
When I’m done, your secrets are gone.”

Keylogger

300

“I’m a hacker’s army, controlled by one,
Together we attack until systems are done.”

Botnet

300

“I’m a hacker in disguise,
Testing systems to make them wise.”

White Hat

300

“I send you to a fake address without a hitch,
Your browser obeys — and hands over the switch.”

Pharming

400

“I give users only the access they truly need,
No extra power — that’s how I lead.”

Least Privilege

400

“I turn long data into a short fixed name,
One-way math keeps it safe — that’s my game.”

Hashing

400

“I stack many defenses so attackers slow down,
Multiple layers protect the crown.”

Defense-in-Depth

400

“I assume nothing is safe until checked and seen,
Every request is verified — no trust by routine.”

Zero Trust

400

“I prove a message came from you and can’t be denied,
A digital promise kept and certified.”

Non-repudiation

500

“I live inside systems, unseen and deep,
I wake when you rest, your secrets I keep.”

Rootkit

500

“I’m trusted code that turns unkind,
Attackers hide inside my kind.”

Supply Chain Attack

500

“I collect data from every device,
To find the threat before its slice.”

SIEM (Security Information and Event Management)

500

“I’m a hacker’s home inside your app,
I steal your data through a tiny gap.”

SQL Injection

500

“I attack machines that learn to see,
Turning AI against you and me.”

Adversarial Attack

M
e
n
u