What does “cybersecurity” protect?
Data, devices, and networks from digital attacks
What is hardware?
The physical parts of a computer
What does antivirus software do?
Detects and removes malware
What is multi-factor authentication (MFA)?
A login process that uses two or more methods to verify identity
What does "CTF" stand for in cybersecurity?
Capture the Flag
True or False: Cybersecurity only applies to big companies.
False
What is an IP address used for?
Identifying a device on a network
What is a firewall?
A system that blocks unauthorized access to/from a network
What’s one way to protect your password?
Use long, complex, unique passwords; don’t reuse them
What kind of problems are usually in CTF challenges?
Cryptography, web hacking, forensics, reverse engineering
What is the CIA Triad in cybersecurity?
Confidentiality, Integrity, Availability
What is the purpose of an operating system (OS)?
It manages hardware and software resources
What is social engineering?
Tricking people into giving up personal info or access
What does “patching” software mean?
Updating it to fix security vulnerabilities
What is a flag in a CTF game?
A hidden string of text that proves you solved the challenge
Give an example of a cyber threat.
Phishing, malware, ransomware, etc.
Name one difference between IPv4 and IPv6.
IPv6 allows more addresses than IPv4
What does it mean if data is "at rest"?
It’s stored on a device, not being used or transferred
What’s the purpose of encryption?
To protect data by turning it into unreadable code
What tool can you use to inspect website code during a CTF?
Browser Dev Tools or “Inspect Element”
What is the difference between a threat, vulnerability, and risk?
possible danger; Vulnerability: weakness; Risk: impact of threat exploiting a vulnerability
What are the 7 layers of the OSI model used for?
To explain how data moves through a network
What is the difference between confidentiality and integrity in cybersecurity?
Confidentiality = keeping secrets; Integrity = making sure info isn't altered
What is a DDoS attack and how can it be stopped?
An attack that overwhelms a server with traffic; use filters or load balancers
How can you stay ethical while playing CTFs?
Only use legal CTF environments, don’t hack real systems