Malware Madness
Hackers & Cyber Crime
Online Threats
Network Security
Protection & Prevention
100

This type of malicious software demands money to unlock your files.

What is ransomware?

100

Criminal activity carried out using computers or the internet. 

What is a cybercrime?

100

Fraudulent schemes conducted over the internet to steal money or personal information

What are internet scams?

100

These monitor and control incoming and outgoing network traffic based on security rules.

What are firewalls?

100

You should avoid sharing these with others, and keep them strong and unique to protect your accounts. 

Whare are passwords?

200

This type of malware disguises itself as a legitimate software to trick users into installing it. 

What is a Trojan?

200

A hacker who breaks into systems for malicious or illegal purpose?

What is a black hat hacker?

200

Unwanted bulk email message, often advertising or malicious. 

What is spam?

200

This type of attack floods a website or server with traffic to shut it down. 

What is a DDoS attack?

200

 This type of software scans, detects, and removes malware from your computer. 

What is antivirus software?

300

This type of malware spreads on its own without attaching to another file. 

What is a worm?

300

The act of secretly stealing sensitive information from governments or companies online. 

What is cyber espionage?

300

A scam that tricks users into revealing personal information through fake emails or websites. 

What is phishing?

300

This tool encrypts internet traffic, and creates a secure tunnel between your device and the internet. 

What is a VPN?

300

This is a safe, isolated area where suspicious or infected files are placed so they don't harm your system. 

What is quarantine.

400

This malware attaches itself to files and spreads when the file is opened. 

What is a virus?

400

A computer infected and controlled remotely by an attacker is called this. 

What is a zombie?

400

Redirecting users from a legitimate website to a fake one without their knowledge is called this. 

What is pharming?

400

Small files stored on your computer by websites to track activity.

Whare are cookies?

400

Strong passwords, firewalls, and regular software updates are examples of these measures that keep systems safe. 

What is cybersecurity best practices.

500

This advances malware hides deep within a system to avoid detection and maintain access. 

What is a rootkit?

500

A network of infected computers controlled by one attacker is called this. 

What is a botnet?

500

Using digital platforms to harass or intimate someone repeatedly. 

What is cyber bullying?

500

A specific pattern used by antivirus programs to identify known threats. 

What is a virus signature?

500

The three core pillars of the CIA triad are designed to guide organizations in protecting digital assets. 

What are Confidentiality, Integrity, and Accuracy?