Basic Terminology
Name That Acronym
Just Do It!
Smooth Criminal
Potpourri
100

This is the term for harmful software that seeks to damage or exploit the machines that run it.

What is Virus/Malware?

100

BYOD

What is Bring Your Own Device?

100

Daily Double!

The most common type of cyber attack.

100

This type of threat originates from within an organization.

What is an Inside Threat?

100

Name two types of authentication, for MFA.

Password, Fingerprint, Facial Recognition, Geo Location, PIN, SecureKey

200

This type of malicious software is designed to lock access to a computer system or data until a sum of money is paid.

What is ransomware?

200

VPN

What is a Virtual Private Network?

200

You need to do this after your computer installs updates. The sooner the better!

What is reboot the computer?

200

This type of attack targets specific individuals by exploiting information gathered through platforms like social media accounts, company's website, and LinkedIn.

What is spear phishing?

200

The collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as the devices themselves.

What is IoT, or Internet of Things?

300

Malicious software that disguises itself as a legitimate program.

What is a Trojan Horse?

300

MFA

What is Multi-Factor Authentication?

300

The simplest and most effective way to protect your accounts from unauthorized access.

What is Multi-Factor Authentication?

300

This type of attack exploits human error, confusion, and manipulation to gain private information, access to restricted systems, or valuable data.

What is Social Engineering?

300

These small messages on websites track your browsing preferences.

(They also taste quite delicious!)

What are cookies?

400

A cyber attack where attackers impersonate a trustworthy entity to trick individuals into revealing sensitive information.

What is Phishing?

400

SSO

What is Single Sign On?

400

The term for the practice of regularly updating software and systems to protect against unknown vulnerabilities.

What is Patching?

400

This type of cyber-attack attempts to steal your credentials through text messaging.

What is Smishing (SMS Phishing)?

400

Daily Double!

What the ā€œSā€ in HTTPS stands for.

500

A security device that monitors and controls incoming and outgoing network traffic.

What is a Firewall?

500

PII

What is Personally Identifiable Information?

500

This simple action helps keep your computer safe when you step away from it.

What is Locking your screen?

500

This term is used to describe someone entering a secure area by following someone with legitimate access. 

What is Tailgating?

500

The process of converting data into an unreadable format to protect it from unauthorized access.

What is encryption?