Cybersecurity
Internet of Things
Internet Safety
Data
Cyber Ethics & giving Credit
100

Protection of computer systems, networks, and data from digital attacks.

What is cybersecurity?

100

The network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.

What is the Internet of Things?

100

This is an example of personal information you should NOT use in a username.

What is name/DOB/age?

100

Using graphs, charts, and images to visualize complex data.

What is data visualization?

100

This is who holds the legal rights to a work protected by copyright.

What is the creator/owner?

200

Identity theft, stealing money, stealing private information, controlling private computers.

What is cybercrime?

200

With the accelerated use of IoT, significant cyber _____ to critical information.

What is risk?

200

This is something you should do if someone online claims to know you.

What is verify their identity/proceed with caution?

200

This type of chart is great for showing percentages.

What is a pie chart?

200

In copyright, this is the creator retaining all rights, and the work cannot be used without permission.

What is all rights reserved?

300

The purpose of cybersecurity is to ____________ all things related to computers and networks.

What is protect?

300

Name one purpose of major cyber attacks on critical infrastructure.

What is to cripple society and extort money?

300

It is considered _______________ when a person is contacting someone repeatedly against their wishes.

What is harassment?

300

One method for collecting data...

What is surveys?

300

When a work is in the _________ ___________, the work can be freely used by the public.

What is public domain?
400

One method to prevent cyber attacks is using ___________.

What is firewalls?

400

With IoT deployments, this is something that is often prioritized over IT cybersecurity.

What is Quick Time-To-Market and launch?

400

This is the primary difference between data privacy and data security.

What is "Privacy is about data usage, security is about data production"?

400
How sensitive data is typically stored to ensure security.

What is encrypted/encyrption?

400

This is a program that pays hackers to report vulnerabilities.

What is a bug bounty program?

500

Regular software updates is a cybersecurity measure that involves finding and fixing system _________________.

What is vulnerabilities or weaknesses?

500

How do IoT devices in factories help improve operations?

What is by predicting potential machine malfunctions/problems?

500
It is important to use different passwords for different accounts so that if your password is hacked, ________________________.

What is all accounts aren't compromised.

500

This is what happens when a hacker accesses an encrypted database without an encryption key

What is the data appears as gibberish?

500

Working as a penetration tester is considered _________ hacking.

What is legal?

600

This is a 3 component, widely accepted security measure that should be guaranteed in every secure system.

What is the CIA Triad?

600

Name an environmental benefit IoT can provide.

What is helping manage resources responsibly?

600

This is a verification process with two steps for extra security.

What is two-factor authentification?

600

The purpose of a ______  ___________ is to store large amounts of data.

What is a data center?

600

Where did the terms "White Hat" and "Black Hat" come from?

What is early western films?

700

A student viewing classmates grades represents a breach of ______________.

What is confidentiality?

700

Name a way that IoT can benefit agriculture.

What is providing real-time data on soil conditions/crop health/etc.?

700

What is something about a website you can check to verify the secureness of that site?

What is if HTTPS is in the URL?

700

The reason it is important to have predefined answer choices in a survey.

What is to ensure consistent data?

700

The maximum prison time for illegal hacking under the Computer Fraud and Abuse Act in the U.S. is _______.

What is 20 years?

M
e
n
u