Advanced Cybersecurity Concepts
Notorious Hackers
Internet History
Data Protection Technologies
Cybersecurity in Pop Culture
400

This is the practice of defending computers and servers, mobile devices, electronic systems, networks, and data from malicious attacks.

What is cybersecurity.

400

Once the most wanted cyber criminal in the U.S., he was arrested in 1995 and later became a consultant and writer.

Who is Kevin Mitnick.

400

This technology, fundamental to web browsing, was invented in 1990 by Tim Bernese-Lee.

What is HTML.

400

A type of data storage technology that automatically makes copies of data in multiple places.

What is redundancy or backup.

400

This TV series, starring Rami Malik, focuses on a cybersecurity engineer and hacker with social anxiety disorder and clinical depression.

What is “Mr. Robot”.

800

A comprehensive plan for the recovery and continuation of vital technology infrastructure and systems following a natural or human-induced disaster.

What is a disaster recovery plan.

800

This hacker group is known for high-profile attacks against major corporations, and government entities, often with a political message.

Who is Anonymous.

800

Considered the first web browser, it was introduced in 1991.

What is the WorldWideWeb.

800

The process of obscuring data to make it unreadable without special knowledge, key, or password.

What is encryption.

800

A 1995 film starring Angelina Jolie and Jonny Lee Miller, focusing on a group of young hackers.

What is “Hackers”.
1200

This security measure involves using physical characteristics, such as fingerprints or eye scans, to identify individuals.

What is biometrics.

1200

Nicknamed the “Dark Dante,” he broke into dozens of high-profile computer systems in the late 1980s and early 1990s.

Who is Kevin Poulsen.

1200

This was the original name for the internet when it was first developed in the 1960s.

What is ARPANET.

1200

This cryptographic protocol is used to secure communications over a computer network.

What is SSL/TLS.

1200

This novel by Dan Brown involves a sophisticated computer that breaks codes, threatening the security of U.S. intelligence.

What is “Digital Fortress”.

1600

The C.I.A. Triad in cybersecurity stands for Confidentiality, Integrity, and this.

What is Availability.

1600

This British hacker was accused of executing the biggest military computer hack of all time in the early 2000s.

Who is Gary McKinnon.

1600

The first message ever sent over ARPANET, was this three-letter word.

What is “log”.
1600

A secure and distributed ledger technology used in cryptocurrencies. 

What is blockchain.

1600

A 2016 film where a CIA agent and his hacker friend summon their skills to uncover a major conspiracy.

What is “Jason Bourne”.

2000

A sophisticated method that cyber criminals use to gain access to networks by bypassing regular authentications procedures. 

What is a pass-the-hash attack.

2000

Founder of the infamous Black Hat Briefings, he is a cybersecurity expert and hacker once known for his ability to ‘vanish’ digitally.

Who is Jeff Moss.

2000

This company, a major player in the early days of personal computing, launched the first popular graphical browser in 1993.

What is Netscape Navigator.

2000

The name of the algorithm that forms the basis of Google’s two factor authentication.

What is Time-based One-Time Password (TOTP) algorithm.

2000

This popular video game series involves hacking and surveillance as a key part of its dystopian future setting.

What is “Watch Dogs”.

M
e
n
u