Phishing
Strong Passwords
Staying Safe Online
Data Privacy
BONUS
100

This term refers to deceptive emails designed to trick recipients into revealing personal information or clicking malicious links.

What is phishing?

100

DAILY DOUBLE!

This type of character, like # or @, is important to include in a strong password to increase security.

What is a special character?

100

This basic step involves regularly updating your software and apps to protect against security vulnerabilities.

What is software updates?

100

This type of data is accessible by everyone.

What is public data?

100

A password that includes your name or birthdate is considered this, making it easy for hackers to guess.

What is a weak Password?

200

This is a common sign of a phishing email, often containing spelling and grammatical errors.

What are typos?

200

This type of attack uses automated tools to systematically guess a password until the correct one is found.

What is a brute-force attack?

200

This is a next generation antivirus software that is used at BTL.

What is Sentinel One?

200

DAILY DOUBLE!

This security measure adds an extra layer of protection by requiring two forms of identification.

What is two-factor authentication?

200

This type of software can help protect against phishing attacks by blocking malicious websites.

What is antivirus software?

300

Often used in phishing attacks, this technique involves disguising malicious links within seemingly harmless text.

What is URL spoofing?

300

This common recommendation advises users to incorporate elements such as uppercase letters, numbers, and special characters into their passwords.

What is password complexity?

300

DAILY DOUBLE!

This security protocol encrypts your internet connection and helps protect your online privacy.

What is a Virtual Private Network?

300

This regulation, implemented in the European Union, aims to protect individuals’ personal data and privacy.

What is the General Data Protection Regulation (GDPR)?

300

This refers to malicious software designed to disrupt, damage, or gain unauthorized access to computer systems and networks.

What is Malware?

400

DAILY DOUBLE!

This targeted phishing attack is often customized and personalized to deceive a specific individual or organization.

What is Spear Phishing?

400

This organization is the leader in providing guidelines for information security including strong passwords.

What is National Institute of Standards and Technology (NIST)

400

This security principle states that an organization should limit user access based on their roles, thus reducing the need for users to have complex passwords for every account.

What is the principle of least privilege?

400

This Data type can cause the company a lot of damage

What is Confidential data?

400

This term refers to the practice of sending a large volume of phishing emails to random recipients in the hope that some will fall for the scam.

What is a phishing campaign?

500

This method involves using machine learning algorithms to identify patterns and anomalies in email traffic that may indicate phishing attempts.

What is anomaly detection?

500

This psychological phenomenon explains why users often choose weak passwords, despite knowing better, often leading to predictable patterns in password selection.

What is cognitive ease?

500

This technique, often used in social engineering, involves gathering information about a target from public sources to exploit their personal or professional connections.

What is open-source intelligence (OSINT)?

500

DAILY DOUBLE!

This technology encrypts data at rest, making it unreadable without the appropriate decryption key.

What is Full-Disk Encryption?

500

This term describes the phenomenon where individuals’ online behaviors are tracked and analyzed to create detailed profiles, often without explicit consent.

What is behavioral tracking?