Cyber Hygiene
Hackers and Scams
Strong Passwords
Social Media Safety
USA
100

This acronym at the start of a website URL indicates the connection is secure.

What is HTTPS?

100

These individuals use their technical skills to gain unauthorized access to systems.

What are hackers?

100

Experts recommend this minimum length for creating a strong password.

What is 8 characters?

100

Posting this personal detail real-time online can make you a target for criminals.

What is your location?

100

This popular video-sharing app was temporarily removed from U.S. app stores due to national security concerns but has since been reinstated following executive orders and ongoing discussions.

What is TikTok?

200

Installing this type of software can help protect your computer from viruses and malware.

What is antivirus software?

200

This type of online scam tricks victims into giving away sensitive information, such as passwords or credit card numbers.

What is phishing?

200

This feature combines something you know (like a password) with something you have (like a texted code) for extra security.

What is two-factor authentication (2FA)?

200

Setting your Instagram or Twitter account to this ensures that only approved users can see your posts.

What is private?

200

This company, which owns the world’s most popular social media platform, implemented end-to-end encryption for its messaging app.

What is Meta?

300

This simple action, often ignored, can significantly reduce your risk of being hacked by outdated vulnerabilities.

What is updating your software?

300

This type of malicious software locks users out of their files until a payment is made.

This type of malicious software locks users out of their files until a payment is made.

300

A tool that helps generate, store, and autofill strong passwords securely.

What is a password manager?

300

This type of scam involves pretending to be a trusted person or celebrity and asking for money.

What is an impersonation scam?

300

In 2019, Apple introduced this biometric security feature, which uses the user’s face to unlock devices and authorize payments.

What is Face ID?

400

This type of connection is risky to use without a VPN.

What is public Wi-Fi?

400

This hacking collective, known for wearing Guy Fawkes masks, has claimed responsibility for attacks worldwide.

What is Anonymous?

400

An attack where every possible password combination is tried until the correct one is found is called this.

What is a brute-force attack?

400

Before accepting a friend request, checking this can help you avoid fake accounts.

What are mutual friends/profile activity?

400

This popular platform where you can watch videos also helps protect kids by allowing parents to set restrictions on what they can watch. It even has a special version just for children.

What is YouTube Kids?

500

A feature available on some devices allows you to erase data remotely if it’s stolen.

What is remote wipe?

500

This technique relies on manipulating people to reveal confidential information.

What is social engineering?

500

A strong password should include a mix of these.

What are uppercase and lowercase letters, numbers, and symbols?

500

Celebrating this online might seem harmless, but sharing the exact details can help identity thieves guess security questions.

What is your date of birth?

500

This American company created one of the most widely used operating systems and helps protect users with its built-in Defender antivirus.

What is Microsoft?