"I promise free gifts if you just sign in,
But behind the smile, I plan to win."
Scam
“I ask for your login, I seem so true,
But once you trust me, your account’s through!”
Phishing
“I pop up online saying ‘Your PC’s sick!’
Pay me fast — that’s my trick.”
FAKE ALERT
“I’m not your friend, though my name may show,
Click my file, and trouble will grow.”
MALWARE
“I look official, wear a brand’s face,
But behind the logo, I’m out of place.”
SPOOFING
“I guard your computer day and night,
Stopping threats before they bite.
Without me, viruses run free —
Who am I supposed to be?”
ANTIVIRUS
“I stop the bad and let good through,
Protecting networks — that’s what I do.”
FIREWALL
“I hide your info so others can’t read,
A secret code is all I need.”
ENCRYPTION
“I look normal but I’m really sly,
Once I enter, your system might cry.”
TROJAN
“If your files vanish in a blink,
I bring them back — don’t skip my link.”
BACKUP
“I lock your files, demand some cash,
Pay me quick or I’ll make a crash.”
RANSOMEWARE
“I test systems without being mean,
To find the holes, I stay unseen.”
Ethical hacker
“I record your keys while you type away,
Your secrets are mine by end of the day.”
Keylogger
“I copy your data before it’s lost,
Saving it safe, no matter the cost.”
Data backup
“I send traffic like a roaring sea,
Servers drown and can’t reply to thee.”
DDoS
“I decide who gets in and who stays out,
Without my checks, there’s risk, no doubt.”
ACCESS CONTROL
“I ensure data stays real and true,
Tampering with me won’t work for you.”
Integrity
“I track every step you take inside,
In logs and records, I never hide.”
Audit Trail
“I’m your safety plan when attacks arise,
Prepared in advance, no surprise.”
Incident Response
“I prove you’re you with password or face,
Without me, no one gets in this place.”
Authentication
“I come from trusted code you didn’t suspect,
One small update — now I infect.”
Supply Chain Attack
“I never sleep, I never rest,
I watch for threats — that’s my test.”
SOC (Security Operations Center)
“I’m fake data made to attract,
To trap the hacker’s sneaky act.”
HONEYPOT
“I slip inside through human error,
One weak click — and I cause terror.”
Human Vulnerability
“I mimic real users, calm and neat,
Bypassing systems with quiet feet.”
Credential Theft