Basic Terminology
Name That Acronym
Just Do It!
Smooth Criminal
Potpourri
100

This is the term for harmful software that seeks to damage or exploit the machines that run it?

What is Malware?

100

BYOD

What is Bring Your Own Device?

100

A combination of uppercase and lowercase letters, numbers, and special characters at least 16 characters long.

What is a strong password?

100

This type of threat originates from within an organization.

What is an Inside Threat?

100

The term for the practice of regularly updating software and systems to protect against unknown vulnerabilities.

What is Patching?

200

This type of malicious software is designed to block access to a computer system or data until a sum of money is paid.

What is ransomware?

200

VPN

What is a Virtual Private Network?

200

You need to do this after your computer installs updates. The sooner the better!

What is reboot the computer?

200

This type of attack targets specific individuals by exploiting information gathered through platforms like social media accounts, company's website, and LinkedIn.

What is spear phishing?

200

The collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as the devices themselves.

What is IoT, or Internet of Things?

300

Malicious software that disguises itself as a legitimate program.

What is a Trojan Horse?

300

MFA

What is Multi-Factor Authentication?

300

The simplest and most effective way to protect your accounts from unauthorized access.

What is Multi-Factor Authentication?

300

This type of attack exploits human error, confusion, and manipulation to gain private information, access to restricted systems, or valuable data.

What is Social Engineering?

300

Cybercriminals hit the 'bullseye' when they were able to steal data from this retail company

What is Target?

400

A cyber attack where attackers impersonate a trustworthy entity to trick individuals into revealing sensitive information.

What is Phishing?

400

DDoS

What is Distributed Denial of Service?

400

The process of creating copies of data and storing it elsewhere for potential future recovery.

What are Backups?

400

These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.

What is Organized (Cyber) Crime?

400

This type of cyber-attack attempts to steal your credentials through text messaging.

What is Smishing (SMS Phishing)?

500

A security device that monitors and controls incoming and outgoing network traffic.

What is a Firewall?

500

PII

What is Personally Identifiable Information?

500

This type of insurance protects businesses against cyber threats and data breaches

What is Cyber-Liability Insurance?

500

This type of sophisticated cyber-attack is a continuous computer hack that occurs under the radar and against a specific object, usually for long periods of time.

What is an APT (Advanced Persistent Threat)?

500

Matthew Broderick plays a high-school aged computer whiz who accidentally accesses a military computer programmed to simulate... well, precisely what the title suggest.

What is WarGames (1983)?