Cybersecurity Basics
Types of attacks
Safe Practices
Definitions
100

what is cybersecurity

Cybersecurity is the practice of protecting computers, networks, and data from unauthorized access, damage, or theft.

100

List three signs of a phishing email.


- A suspicious or unknown sender 

- Urgent or threatening language 

- Links or attachments that look odd or do not match the real website 

100

How can you create a strong password?


Create a strong password by using a long phrase (12 or more characters) that mixes upper- and lowercase letters, numbers, and symbols and avoids personal details like your name or birthday

100
What is Social Engineering?

Social engineering is using psychology and manipulation (not just technology) to trick people into giving up confidential information or doing something unsafe, like clicking a malicious link.


200

Name one type of cyber threat.


One type of cyber threat is malware, which is malicious software designed to damage systems or steal data.

200

Describe a denial-of-service attack.


A denial-of-service (DoS) attack overwhelms a website or service with traffic so that real users cannot access it.

200

What is two-factor authentication? 


Two-factor authentication (2FA) adds a second proof of identity (like a code sent to your phone or an app) in addition to your password, making accounts harder to break into.

200

What is GDPR?

GDPR (General Data Protection Regulation) is a European Union law that gives people strong rights over how their personal data is collected, used, and stored.

300

What skills are needed for a career in cybersecurity?


Important skills for a cybersecurity career include problem-solving, knowledge of networks and operating systems, understanding of threats and tools, clear communication, and willingness to keep learning.

300

What is the purpose of encryption?


The purpose of encryption is to scramble data so only someone with the correct key can read it, protecting information if it is intercepted or stolen.

300

What steps should you take if your data is breached?



If your data is breached, you should immediately change passwords, enable 2FA, monitor bank and credit accounts for unusual activity, and report the incident to your organization or provider.


300

What is the Computer Fraud and Abuse Act?


The Computer Fraud and Abuse Act (CFAA) is a U.S. law that makes unauthorized access to computers and networks a crime.


400

How does artificial intelligence impact cybersecurity?

Artificial intelligence impacts cybersecurity by helping detect threats faster and find unusual behavior, but it also lets attackers create more convincing scams, malware, and deepfakes.

400

What is ransomware? 


Ransomware is malware that encrypts your files and demands payment (a ransom) to unlock them.


400

Why should you update your software regularly?** 



You should update software regularly because updates patch security vulnerabilities that attackers could exploit.

400

Define Malware.

Malware is any harmful software, such as viruses, worms, or spyware, created to damage devices or steal information.

500

Define Phishing

Phishing is a scam where attackers pretend to be a trusted person or company (often by email or text) to trick you into giving passwords, money, or personal information.

500

What does a firewall do?


A firewall is a security tool that filters network traffic, blocking suspicious or unauthorized connections between a device or network and the internet.