HOW HACKERS GET IN
PASSWORDS & ACCOUNT ACCESS
MALWARE & BAD SOFTWARE
NETWORK & DATA SAFETY
RESPONDING TO A CYBER ATTACK
100

What does it mean when someone “hacks” a system? 

They access it without permission.

100

What is a password used for?

To prove who you are.

100

What is malware?

Software designed to cause harm.

100

What 2 "conditions" need to be present to form a network?

1). Devices must be connected somehow.

2). Devices are sharing data.

100

What should you do if something online feels wrong?

Stop and tell a trusted adult.

200

Why are old or outdated programs risky to keep using?

They may have security holes hackers know about.

200

Which is stronger: “soccer12” or “S0ccer!92Blue”?

“S0ccer!92Blue”

200

Why do hackers disguise malware as games or tools?

To trick user into installing it. 

200

Why is public Wi-Fi risky for passwords?

Others can intercept data.

200

Why is reporting cyber problems quickly important?

To limit damage.  

300

A website lets users type anything into a form without checking what was typed in. Why is that dangerous?

Hackers can insert harmful code that could "break" the form and allow a hack. 

300

Why is using the same password everywhere risky?

If one account is hacked, others can be too.

300

How can malware get onto a device?

Through bad links, downloads, or attachments.

300

What is the main purpose of a firewall?

Block unwanted traffic.

300

What does “think before you click” really mean?

Pause and check first.

400

A Red Hat Hacker is someone

Who goes after the bad guys as a public service.  Vigilantes. 
400

What does two-factor authentication (2FA) add beyond an initial password one has to enter?

A second proof of identity.

400

Why are “free” programs from unknown websites risky?

They may hide malware.

400

What is the most important reason why data needs to be backed up?

So it can be restored after an attack.

400

A login happens at 3:00 a.m. for a student account. Why is that suspicious?

It’s unusual and may mean the account was hacked by someone overseas on a different timezone. 

500

A hacker breaks in using a feature that was meant to HELP users. What is that called?

Exploiting a Vulnerability
500

A hacker gets your password but still can’t log in. What security feature stopped them?

Two-factor authentication.

500
What's the name of the Malware that locks a computer, files, or access and demands the user pay a sum of money?

Ransomware

500

When encrypted data is stolen, how can the data still deny the thief access to it?

It has to be decrypted with a key. 

500

What is the FIRST step after discovering a cyber attack?

Identify what happened.

M
e
n
u