This process scrambles data so only authorized users can read it.
What is encryption?
Malicious software that harms computers.
What is malware?
This animal is known for changing its color to blend into its surroundings.
What is a chameleon?
A secret word or phrase used to log in.
What is a password?
This singer is known for the album Midnights and the Eras Tour.
Who is Taylor Swift?
This type of encryption uses one shared key.
What is symmetric encryption?
Fake emails or messages used to steal personal information.
What is phishing?
The name of the first and most widely used cryptocurrency, created in 2009.
What is Bitcoin?
This is used by a browser to verify that a website's public key actually belongs to the intended entity, helping to establish trust and ensure a secure HTTPS connection.
What is a Digital Certificate?
This quarterback led the Seahawks to a 2026 Super Bowl victory.
Who is Sam Darnold?
This type of encryption uses a public key and a private key.
What is asymmetric encryption?
An attack that overwhelms a website with traffic.
What is a DDoS attack?
This African country has the most pyramids in the world - more than Egypt.
What is Sudan?
This security method requires a user to provide at least two separate forms of evidence—such as a password and a code sent to a phone—to verify their identity before gaining access.
What is MFA? (Multi-Factor Authentication)
This rapper, born Shawn Carter, is also a business mogul behind Roc Nation.
Who is Jay-Z?
This type of cipher shifts each letter in the alphabet by a fixed number of positions.
What is Caesars Cipher?
Software that locks your files and demands payment.
What is ransomware?
In this sci-fi netflix series, each episode explores the dark side of technology and social media in standalone stories
What is Black Mirror?
This type of cybersecurity attack occurs when an unauthorized individual sets up a fake, unsecured wireless access point to intercept data from unsuspecting users.
What is a Rogue Access Point?
This famous halftime show performer headlined the Super Bowl in 2023.
Who is Rihanna?
This type of attack tries every possible key or password until the correct one is found.
What is brute force?
In addition to phishing, this concept is based on tricking people into giving away information instead of hacking systems directly.
What is social engineering?
In this 2014 film, humanity escapes a dying earth through a wormhole near Saturn.
What is Interstellar?
While firewalls check for malicious network traffic, this specific type of hardware or software, which captures keystrokes before they are encrypted by browser-level HTTPS, bypasses traditional authentication security, making it a critical threat to user credentials.
What is a Keylogger?
This athlete has won multiple Olympic gold medals in swimming and is one of the most decorated Olympians ever.
Who is Michael Phelps?