The Internet
Cybersecurity
Cryptography
CIA Triad
Cyberwarfare
100

What was the first thing purchased on the Internet?

DAILY DOUBLE

Pizza

100

The trace or trail you leave behind every time you are on the Internet?

DAILY DOUBLE

Digital Footprint

100

What does ENCODE mean?

To hide or conceal

100

What does the CIA Triad stand for?


DAILY TRIPLE

Confidentiality

Availability

Integrity

100

What does IoT stand for?

DAILY DOUBLE

Internet of Things

The Internet of Things (IoT) is a network of devices that can connect and share data with other devices and systems over the internet.

200

What is the speed of light?

DAILY DOUBLE

186,282 miles per second
200

Every password should include 3 things...

Letters, numbers and symbols.

200

What does DECODE mean?

To reveal or make known

200

Ava, Zoe, Maya and Chloe got into Infinite Campus and could see everyone's grade in the class. What part of the CIA Triad is compromised?

Confidentiality

200

Software that is designed to damage or steal data from computers.

Malware

300

What year was the term computer first used and what did it refer to?

DAILY DOUBLE

1613 - a something or someone who does calculations and computations

300

Finish this sentence: If the product is free then...

You are the product.

300

Write out the modulus symbol

%

300

Kendrick, Pryce and Joshua logged into IC and for some reason were able to change all of their grades to an A+. What part of the CIA Triad is compromised?

Integrity

300

When a person takes information and images, typically from other people, and uses them to create a new identity for themselves.

DAILY DOUBLE

Catfishing

400

Who invented the Internet? 

DAILY DOUBLE

Tim Berners-Lee

400

A cyberattack that involves tricking people into sharing sensitive information or downloading malware.

DAILY DOUBLE

Phishing Attack

400

A security process that requires more than just your password to verify your identity. 

Two Factor Authenticatio

400

Andrew, Sam and Elijah couldn't log on to Infinite Campus for some strange reason. What part of the CIA Triad is compromised?

Availability

400

Software that is designed to damage or steal data from computers.

Ransomware

500

Computer Science is...

Solving problems faster and easier.

500

What does VPN stand for and what does it do?

DAILY DOUBLE

Virtual Private Network

It acts as a secure private tunnel over an unsecure public wifi network.

500

What is the value this binary code?

1101  1011

219

500

Every secure network should ensure what three things? Explain each one for 300 extra points

Confidentiality - Only authorized people can see it

Availability - It accessible when needed

Integrity - Nothing can be changed or altered

500

Phishing, tailgating, baiting, and whaling are all examples of _____________.

Social Engineering. 

Social engineering is a technique that tricks people into doing something dangerous online or in person.