This port is used by http traffic
Port 80
This common twisted pair cable is used in Ethernet networks
Cat5 (or Cat5e)
THis type of malware locks your files and demands payment
Ransomware
The process of converting data into unreadable code
Encryption
This is the most common (and worst) password year after year
123456...
Https traffic securely runs over this port
Port 443
This cable type transmits data using light
Fiber Optic
Self-Replicating program that spreads without user action.
Worm
This type of attack floods a server with traffic to crash it
DDoS attack
This is the recommended minimum number of characters for a strong password
12
This port is the standard for FTP control commands
Port 21
This connector is commonly used for coaxial cables
F-type connector
Malware disguised as legitimate software
Trojan Horse
This type of network acts as a private, secure tunnel over the internet to protect data and privacy
adding this layer of security (like a code sent to your phone) helps even if your password is stolen
Default port used by SSH
Port 22
what is VGA
This malware records your keystrokes to steal passwords
Keylogger
A secret string used to verify identity online
Antivirus Software
Hackers use automated tools called this to try millions of password combinations until they get in
Brute Force
POP3 operates over this port
Port 110
This cable is shielded to reduce electromagnetic interference and is often used in industrial environments
STP (Shielded Twisted Pair)
This malware exploits security holes before the vendor even knows about them
Zero-day malware
The practice of sending fake emails to steal data.
Phishing
This 1999 movie features hackers who could bend the rules of reality
The Matrix