Haunted Hackers
Spells & Scripts
Monster Machines
Crypt Creepers
Frightening Frameworks
100

This “most wanted hacker” of the 1990s was famous for breaking into corporate networks and social engineering his way into systems.

Who is Kevin Mitnick?

100

This command-line tool checks whether a host is reachable — and shares its name with a sonar sound.

Ping
100

The “brain” of your computer.

What is the CPU?

100

The process of turning plaintext into ciphertext.

What is encryption?

100

The CIA triad stands for these three core principles.

What are Confidentiality, Integrity, and Availability?

200

In this type of cyber attack, a hacker impersonates a company executive or vendor via email to trick employees into sending money or sensitive information. 

What is Business Email Compromise (BEC)?

200

This exploit abuses a program by feeding it data larger than it can handle, potentially allowing attackers to hijack memory and execute arbitrary code.

What is a buffer overflow?

200

This spooky tech can mimic human decision-making and learning.

What is artificial intelligence?  

200

This type of cryptography uses both a public and private key.

What is asymmetric encryption?

200

This healthcare regulation protects patient information in the U.S.

What is HIPAA?

300

This 2017 ransomware attack spread worldwide, encrypting files on infected computers and demanding Bitcoin payments to release them.

What is WannaCry?

300

This type of attack injects malicious code into a website’s input fields, tricking the browser into executing unintended commands.

What is Cross-Site Scripting (XSS)?

300

A network of compromised devices, where each infected computer is called a “zombie,” can be controlled to launch a coordinated DDoS attack.

What are botnets?

300

HTTPS uses this encryption protocol to secure websites.

What is TLS (Transport Layer Security)?

300

This security approach assumes no user or device should ever be trusted by default.

What is Zero Trust?

400

One of the first email-borne viruses to spread rapidly, it infected Microsoft Word documents and caused office chaos in 1999.

What is the Melissa virus?

400

This type of automation script on Linux can schedule tasks to run at specific times, often for maintenance or attacks.

What is a cron job?

400

These futuristic computers use qubits instead of bits, allowing them to exist in multiple states simultaneously and solve certain problems much faster than classical computers.

What is a quantum computer?

400

In cryptography, this chilling phenomenon describes how a tiny change in the input causes a massive change in the output.

What is the Avalanche Effect?

400

This European Union regulation gives individuals unprecedented control over their personal data and requires organizations to report breaches within 72 hours.

What is the General Data Protection Regulation (GDPR)?

500

This anonymous collective, often wearing Guy Fawkes masks, is known for high-profile cyberattacks and hacktivism campaigns targeting governments and corporations.

Who is Anonymous?

500

This file in Linux stores user account information, including hashed passwords, and is a common target for attackers.

What is /etc/shadow?

500

This monster supercomputer was first installed in 1976, the same year the cult classic horror film Carrie was released, making it a terrifying year for both technology and Halloween fans.

What is the Cray-1?

500

The “RSA” algorithm is named after these three inventors.

Who are Rivest, Shamir, and Adleman?

500

These five continuous functions make up the core of the NIST Cybersecurity Framework and guide organizations in managing cybersecurity risk.

What are Identify, Protect, Detect, Respond, and Recover?

M
e
n
u