Famous Hacks
Secure password
malware
crypto
network security
100

Once was the most wanted cyber criminal in the world.

Who is Kevin Mitnick?

100

This is a bad password because then a hacker can get in easier to more things.

What is using personal and common passwords?

100

Malware to block access to a computer system until a certain amount of money is paid.

What is ransomware?

100

The original text before encryption.

What is Plaintext?

100

Common security measures involving a username and a password.

What is authentication?

200

Used a worm to target Iranian nuclear facilities.

What did stuxnet do?

200

This is the minimum recommended length for a strong password. 

What is 12 characters?

200

Type of malware designed to replicate itself and spread to other computers.

What is a Worm?

200

Secures communication over the internet.

What is SSL/TLS

200

Device that lets in and out going network traffic based on the security.

What is a Fire wall?

300

Suffered a massive data breach in 2013 and it compromised over a billion users.

What happened to Yahoo?

300

This is like a one time password commonly in two step verification.

What is TOTP

300

Malware that is designed to record the keystrokes on a users computer.

What is keylogger?

300

This is the process of converting plaintext into a intelligible text

What is encryption?

300

Software and hardware that monitors and records upcoming and outgoing network traffic based on security.

What is NIDS?

400
Group of know for its high profile cyber attacks and with the guy Fawkes mask.

Who is Anonymous?

400

Its the term for it using every combination thats possible.

What is a Brute force attack?

400

Often is confused with a legit website and it gains access to a computer while its hidden from the user.

What is Trojan Horse?

400

This is the process of converting plaintext into a unintelligible text

What is decryption? 

400

A private network to use public network.

What is a VPN?

500

event in 2014 that leaked personal photos from several high profile celebrities due to apple's icloud service.

What is the Fapp?

500

System that uses two different keys, one public, and one private.

What is public-key?

500

Malware that was discovered in 2010 and is believed to be in IranĀ“s Nuclear program.

What is Stuxnet?

500

a digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.

What is Cryptocurrency? 

500

any activity designed to protect the usability and integrity of your network and data.

What is Network Security?