CYBER THREATS
MALWARE TYPES
CYBERSECURITY SOLUTIONS
PASSWORDS & AUTHENTICATION
NETWORK & DATA SECURITY
100

What is phishing?

This threat tricks users into clicking fake links or entering passwords on fake websites.

100

What is a worm?

This malware spreads itself without needing a host file or user interaction.

100

What is antivirus software?

This tool scans and removes malicious software from your computer.

100

What is a weak password?

This type of password uses common words and is easy to guess.

100

What is HTTPS?

This secure protocol is used for safe browsing on websites.

200

What is ransomware?

This type of malware locks your files and demands payment to restore access.

200

What is a Trojan horse?

This malware disguises itself as legitimate software.

200

What is a firewall?

This system blocks unauthorized access to a network.

200

What is a password manager?

This is a system that stores and generates secure passwords for users.

200

What is a private network?

This type of network is safer than public Wi-Fi and requires a password.

300

What is a DDoS attack?

This attack floods a server with traffic to make a website unavailable.

300

What is a virus?

This malware replicates itself by attaching to other files.

300

What is patching or updating?

This practice involves regularly updating software to fix vulnerabilities.

300

What is a brute-force attack?

This attack tries every possible combination to guess a password.

300

What is a VPN?

This is a secure tunnel used to protect internet traffic.

400

What is a keylogger?

This malware secretly records everything you type on your keyboard.

400

What is adware?

This type of malware displays unwanted advertisements.

400

What is two-factor authentication (2FA)?

This adds an extra layer of security by requiring two forms of verification.

400

What is a dictionary attack or social engineering password guessing?

This method uses personal information to guess passwords.

400

What is a man-in-the-middle attack?

This attack intercepts communication between two users.

500

What is social engineering?

This attack involves manipulating people rather than hacking systems directly.

500

What is a bot or botnet malware?

This malware allows hackers to remotely control your computer.

500

What is encryption?

This technique converts data into unreadable format to protect it.

500

What is biometric authentication?

This authentication method uses fingerprints or face recognition.

500

What is least privilege?

This principle means giving users only the access they need.