Definitions
Passwords
Cyber Crime
100

What is data privacy?

Data privacy is the right of a citizen to have control over how their personal information is collected and used.

100

What combination of 4 things should you use to make your password stronger?

1. Numbers
2. Upper case letters
3. Lower case letters
3. Symbols

100

What is Identity Theft?

the fraudulent use of a person's private identifying information, usually for financial gain.


200

What is Cybercrime?

Criminal activities carried out on computers or the internet.

200

What is Brute Force hacking?

 Using a program to try all different combinations of passwords with Trail and error.

200

What is cyber extortion?

Cyber extortion is the act of cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim.

300

What is Phishing

The fraudulent practice of sending emails or messages pretending to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

300

How long would it take to try brute force a password with 11 numbers

 Instantly

300

What is a Ransomware attack?

Ransomware is a type of malware attack in which the attacker locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.

400

What is Ransomware?

A type of malicious software designed to block access to a computer system until a sum of money is paid.

400

name 3 of the most used passwords

  1. qwerty

  2. Password

  3. 12345

  4. qwerty123

  5. 1q2w3e

  6. 12345678

  7. 111111

  8. 1234567890

400

What does DDoS mean?

Distributed Denial of Service

500

What is Social Engineering?

SOCIAL ENGINEERING is the term used for a broad range of malicious activities accomplished through human interactions

500

What is the most used password?

qwerty

500

What is Website Spoofing?

Website spoofing is the creation of a replica(or copy) of a trusted site with the intention of misleading visitors to a phishing site. Legitimate logos, fonts, colors and functionality are used to make the spoofed site look realistic.

M
e
n
u