Malware
Passwords
Cyber Attacks
Security Measures
Random
100

This type of malware disguises itself as a legitimate program in order to gain access to a computer system.

TROJAN 𓃗

100

This term refers to a password that is easy to guess, often using common words or phrases.

WEAK PASSWORD(;´༎ຢٹ༎ຢ`)

100

This virus, which appeared in 2000, was one of the most widespread and destructive viruses of its time. In it appeared a heart felt message.

ILOVEYOU virus⸜(q˃ α΅• Λ‚ )⸝♑

100

This security software acts as a barrier between a computer or network and the internet, allowing only authorized traffic to pass through.

FIREWALLπŸ”₯🧱

100

𝓦𝓗𝓐𝓣 π“˜π“’ 𝓣𝓗𝓔 π“π“π“œπ“” π“žπ“• 𝓣𝓔𝓑𝓑𝓨 𝓐. 𝓓𝓐π“₯π“˜π“’' π“’π“—π“‘π“˜π“’π“£π“›π“˜π“šπ“” π“žπ“Ÿπ“”π“‘π“π“£π“˜π“π“– π“’π“¨π“’π“£π“”π“œ?

TEMPLE OS πŸ›•

200

This type of malware is designed to spread rapidly through a network, often using files to do so.

WORM 𓆙

200

This term refers to a password that is made up of random letters, numbers, and symbols, making it much more difficult to guess.

STRONG PASSWORDπŸ’ͺ

200

This type of cyberattack involves tricking a user into divulging sensitive information, often by posing as a trustworthy entity.

PHISHING𓆝 🎣

200

This security software is designed to detect and remove malware from a computer or network.

ANTIVIRUS SOFTWARE 🧼

200

𝓦𝓗𝓐𝓣 𝓦𝓐𝓒 𝓣𝓗𝓔 π“•π“˜π“‘π“’π“£ π“œπ“”π“’π“’π“π“–π“” 𝓒𝓔𝓝𝓣 π“žπ“₯𝓔𝓑 𝓣𝓗𝓔 π“˜π“π“£π“”π“‘π“π“”π“£

LOGIN

300

This type of malware encrypts a user's files and demands payment in order to restore access to them.

RANSOMWARE πŸ₯·πŸ’°πŸŒƒ

300

Attackers can crack these weak passwords in seconds because they’re constructed from linguistic patterns found in word lists commonly indexed by automated cracking tools.

BRUTE-FORCING πŸ¦πŸ’¨

300

This type of malware is designed to take control of a computer or network and use it to send spam emails or launch other attacks:

B0T(☞ Ν‘Β° ΝœΚ– Ν‘Β°)☞

300

This term refers to a method of authentication that uses a combination of something the user knows (such as a password) and something the user has (such as a fingerprint or other biometric data).

MULTI-FACTOR AUTHENTICATION (MFA) Γ— πŸ“

300

𝓦𝓗𝓔𝓑𝓔 𝓦𝓐𝓒 𝓣𝓗𝓔 π“•π“˜π“‘π“’π“£ π“’π“žπ“œπ“Ÿπ“€π“£π“”π“‘ π“œπ“π““π“”

ANCIENT GREECE

400

This type of malware is often spread through infected email attachments or links to malicious websites, must be executed.

VIRUSπŸ€’

400

This tool securely stores, organizes, and generates passwords, helping users manage multiple accounts without reusing weak credentials.

PASSWORD MANAGERπŸ‘¨πŸ»β€πŸ’Ό

400

This type of cyberattack involves gaining access to a system and then stealing valuable data or information from it.

HACKING(Λ΅ β€’Μ€ α΄— - Λ΅ ) ✧

400
This term refers to the practice of creating backups of important data in case it is lost or stolen.

DATA BACKUP πŸ“Š

400

𝓦𝓗𝓐𝓣 𝓦𝓐𝓒 𝓣𝓗𝓔 π“•π“˜π“‘π“’π“£ π“‘π“‘π“žπ“¦π“’π“”π“‘ π“˜π“π“₯𝓔𝓝𝓣𝓔𝓓

NETSCAPE

500

This type of malware is specifically designed to capture login credentials and other sensitive information from a user's computer.

Keylogger ⌨️

500

What is used to encrypt WiFi passwords

WPA/WPA2 πŸ“ΆπŸ›œ

500

This type of cyberattack involves using a user's own computing resources to mine cryptocurrency without their knowledge or consent.

CRYPTOJACKING (ΰΉ‘`^Β΄ΰΉ‘)︻デ═一 (;´༎ຢٹ༎ຢ`)

500
This term refers to a hardware device that is used to authenticate a user's identity before allowing access to a system.



SECURITY TOKENπŸͺ™

500

𝓦𝓗𝓔𝓝 π“˜π“’ π“œπ“’. π“”π“œπ“œπ“π“π“€π“”π“›'𝓒 π“‘π“˜π“‘π“£π“—π““π“π“¨

6TH SEPTEMBER

M
e
n
u