An attacker impersonates a company executive (e.g., CEO) and emails an employee in accounts payable, instructing them to make an urgent wire transfer to a new vendor. Which is it?
This is an example of phishing.
You've gotten an email from an unknown source with a link that it encourages you to click. What should you do?
Don't click the link or attachment!
Type of software specifically designed to gain access or damage a computer without the knowledge of the owner.
Malware!
This is the recommended minimum length for a strong password, according to most cybersecurity best practices.
At least 16 characters! You should go for length > complexity. Don't reuse computers! Add MFA!
This term refers to the software designed to protect against viruses and malicious software.
It's antivirus software.
You've been sent a text message that tells you to click a link to view important information about an upcoming USPS delivery.
This is a phishing attack.
You've gotten a message from your friend on social media with a link that states, "OMG, look at this pic of you!?" What should you do?
It's possible that your friend's account has been hacked. If you click that link, it could take you to a fake login page that's designed to steal your account password.
A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.
Ransomware!
What does multi-factor authentication require or 2-factor identification???
It requires two or more different factors, such as a password and then a smartphone/token.
This is unauthorized access to a computer system's data.
This would be hacking.
That's false. Unfortunately, there is spyware that could track your location, record audio, or take photos.
BuildRight Construction's accounting department notices their computers running slowly with unexpected pop-ups appearing frequently. Their IT team discovers spyware has been installed, stealing keystrokes and monitoring network activity. Sensitive client information and financial data may have been compromised. What steps should they take immediately? List at least 1!
Isolate affected computers from the network to prevent further data theft
Run comprehensive antivirus and anti-malware scans on all affected systems
Use specialized spyware removal tools to clean infected computers
Change all passwords, especially for accounting and financial systems
Review financial records and network logs to determine what data was stolen
Notify customers and partners whose information may have been compromised
Contact law enforcement to report the incident
Implement network monitoring to detect ongoing suspicious activity
An attempt to acquire credentials for malicious reasons, by masquerading as a trustworthy entity in an email.
Phishing!
How much did the first Apple-1 computer sell for in 1976?

"The first Apple-1 computers were sold for $666.66 in 1976. Forty-five years later, a still-functioning one has sold for $400,000 [in 2021)" (NPR).
This is the process of converting information into a code to prevent unauthorized access.
It would be encryption.
True or false: Only large companies are targeted by malware.
That's false. Anyone can be a target: individuals, small businesses, etc.
GreenLeaf Retail receives an email that appears to be from their payment processor, asking all employees to re-verify their login credentials due to a "security update." Fifty employees click the link and enter their usernames and passwords. Two days later, the company notices unauthorized transactions totaling $100,000. What should the company do now? List at least 1-2 steps!
Notify all affected employees to change their passwords immediately
Alert the payment processor about the fraudulent email and unauthorized transactions
Contact their bank and payment processor to freeze accounts and dispute the unauthorized charges
Review transaction logs to identify all fraudulent activity
Notify customers whose payment information may have been compromised
File a report with law enforcement
Check for signs of additional system compromise (hackers may have installed malware or spyware)
Monitor accounts closely for further unauthorized activity
This type of malware, often disguised as legitimate software, installs itself without the user’s consent and can give an attacker remote control over an infected system.
It's a trojan horse!
Who is the first known computer programmer?
"English mathematician Ada Lovelace has been called the first computer programmer. She was an associate of Charles Babbage, for whose prototype of a digital computer she created a program in the 19th century" (Britannica).
This device is used to block unauthorized access while permitting outward communication
The term would be firewall.
True or false: The first webcam was created to monitor a coffee pot.
That's true.
"The Trojan Room coffee pot was a coffee machine located in the Computer Laboratory of the University of Cambridge, England. It was the subject of the world's first webcam, created by Quentin Stafford-Fraser and Paul Jardetzky in 1991.
To save people working in the building the disappointment of finding the coffee machine empty after making the trip to the room, a camera was set up providing a live picture of the coffee pot to all desktop computers on the office network. After the camera was connected to the Internet a few years later, the coffee pot gained international renown as a feature of the fledgling World Wide Web, until being retired in 2001" (Wikipedia).
TechFlow Solutions, a software development company with 150 employees, discovers that all their project files are encrypted. A message appears on their screens demanding $500,000 in cryptocurrency within 48 hours or the files will be deleted. The company has no recent backups. What should the company do next? List at least 1 step.
Isolate all infected systems from the network immediately to prevent the ransomware from spreading to other computers
Document the attack (take screenshots of the ransom message, note the time and date)
Contact law enforcement and report the incident [1]
Do NOT pay the ransom—paying does not guarantee file recovery and funds criminal activity [1]
Notify employees and customers that their data may have been compromised
Contact their insurance company if they have cyber insurance
Consult with IT professionals or a cybersecurity firm for recovery assistance
This type of malware is a self-replicating program that spreads across networks by exploiting vulnerabilities, often affecting systems without the need for user interaction.
It's a worm!
True or false: computers were once an occupation and not a machine.
That's true: "The term 'computer', in use from the early 17th century (the first known written reference dates from 1613),[1] meant 'one who computes': a person performing mathematical calculations, before electronic calculators became available. Alan Turing described the 'human computer' as someone who is 'supposed to be following fixed rules; he has no authority to deviate from them in any detail.'" (Wikipedia).
What is the tool that creates a secure and encrypted tunnel between your device and a remote server, used to mask your real IP address and location to protect your privacy.
It's a VPN!