Phishing
Strong Passwords
Staying Safe Online
Data Privacy
BONUS
100

This type of phishing uses text messages to lure victims.

What is SMS phishing?

100

DAILY DOUBLE!


This is the minimum recommended length for a strong password.

What is 12 characters?

100

The lock icon in the top left of the browser

What is HTTPS?

100

A simple but effective mnemonic to remember and use to avoid becoming the victim of fraudsters who urge immediate action.

What is S-T-O-P?

100

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.

Who are hackers?

200

DAILY DOUBLE!

This is a common tactic used in phishing scams where attackers pretend to be a trusted source, like a bank or service provider.

What is impersonation?

200

This cryptographic technique transforms a plaintext password into a fixed-length string of characters, making it unreadable while still allowing verification against stored hashes.

What is hashing?

200

This network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules.

What is a Firewall?

200

 This is a good habit to develop, involving regular updates to your passwords.

What is changing passwords regularly?

200

These fake websites mimic legitimate ones to steal your login credentials.

What are phishing websites?

300

DAILY DOUBLE!

The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.

What is Social Engineering?

300

This is a phrase made up of random words strung together, often used to create a strong and memorable password.

What is a passphrase?

300

This process converts plain text or data into a coded form to prevent unauthorized access.

What is Data Encryption?

300

This commonly suggested practice discourages using personal information in passwords, but studies have shown that many users still incorporate this type of information, despite its vulnerability.

What is personal identifiable information (PII)?

300

In 2020, this popular social media platform suffered a significant hack involving phishing techniques, affecting high-profile accounts.

What is Twitter?

400

 This is a social engineering phishing attack that intentionally deceives its recipient into scanning a QR code, redirecting the person to a bogus website.

What is quishing (QR phishing)?

400

This term refers to a database of previously leaked passwords, which attackers use to quickly compromise accounts with weak or reused passwords.

What is a password blacklist?

400

This feature on social media platforms allows users to control who can see their posts and personal information.

What are privacy controls?

400

DAILY DOUBLE!

Name the security mechanism that verifies the integrity and authenticity of digital messages or documents.

What is a Digital Signature?

400

This technique involves obscuring specific data within a database to protect sensitive information while maintaining its usability.

What is data masking?

500

This infamous phishing attack in 2013 targeted a major retailer, leading to the compromise of millions of customer credit card details.

What is the Target data breach?

500

This type of attack captures passwords by monitoring network traffic.

What is a packet sniffing attack?

500

DAILY DOUBLE!

This type of attack exploits users' tendency to reuse passwords across multiple sites, allowing attackers to gain unauthorized access

What is a credential stuffing attack?

500

This concept involves creating and implementing strict internal policies and protocols to ensure that employees handle sensitive data appropriately, minimizing the risk of breaches.

What is data governance?

500

This security feature alerts you when someone tries to access your account from an unrecognized device or location.

What are login alerts or security notifications?