Risky Business
Breach Me Baby
Hackers Gonna Hack
Let's Get Social
Call the Policy
Bits, Bytes, and Blockbusters
100

This is the practice of protecting computers, servers, networks and data from unauthorized access.

What is Cybersecurity?

100

This security feature makes you prove who you are twice.

What is multi-factor authentication (MFA)?

100

People who use technology to commit malicious activities, breaking into systems, stealing data and often think wearing a hoodie makes them look mysterious.

What is a Cybercriminal?

100

This technique might involve a fake Brad Pitt sending an email asking for money.

What is Phishing?

100

This is the international standard for Information Security Management Systems.

What is ISO 27001?

100

The story follows Neo, a hacker who discovers that the world he knows is a simulated reality controlled by machines.

What is "The Matrix"?

200

When you bring your phone or computer to work and Security cries a little on the inside.

What is BYOD (Bring Your Own "Disaster")?

200

Like the Holy Trinity of Security, these three factors prove you are who you say you are —because just knowing a password is not enough anymore.

What is something you know, something you have, and something you are?

200

This hacktivist group took down government websites and defaced others as part of their infamous attacks in 2012, often with the tagline "We Are Legion".

Who is "Anonymous"?

200

This is the practice of using clever tricks to manipulate people into revealing confidential information.

What is Social Engineering?

200

These 4 classification labels help you decide if your data is out in the open, office-only, locked in a vault, or buried in a bunker.

What are Public Use, Internal Use, Confidential and Secret?

200

The comedic misadventures of Roy, Moss and their supervisor Jen, a team of IT support workers at a large corporation.

What is "The IT Crowd"?

300

This term describes a weakness in a system that can be exploited.

What is a Vulnerability?

300

This type of malware locks users out of their files and demands payment.

What is Ransomware?

300

This organization, led by Julian Assange, sparked global debate on government transparency, privacy, and national security.

What is Wikileaks?

300

If you get a text from "Netflix" saying your account is locked, but you don’t even have Netflix, it’s called this.

What is Smishing?

300

This regulation protects the privacy of individuals within the European Union.

What is GDPR (General Data Protection Regulation)?

300

A whistleblower leaks classified information about NSA's illegal surveillance techniques in this 2016 biographical film.

What is "Snowden"?

400

This is the process of converting data into an unreadable format unless you have the proper key.

What is Encryption?

400

A malicious threat to an organization that comes from people within the organization, who have inside information concerning the security practices, data and computer systems.

What is a insider threat?

(watch "The Inside Man" available in KnowBe4)

400

He was one of the most famous American hackers, crackers and phreakers in history. His nickname was Condor. He also nicknamed him "Ghost in the Wires".

Who was Kevin Mitnick?

400

This type of attack targets specific individuals, often using personalized information to appear legitimate.

What is Spear Phishing?

400

This is the set of Trust Service Criteria used to evaluate how a company manages sensitive data in cloud services, ensuring it’s kept safe and secure.

What is SOC2?

400

Elliot, a brilliant but troubled hacker, becomes a key figure in a in a complex game of global chaos when he and his shadowy allies try to take down the corrupt corporation his company is paid to protect.

What is "Mr. Robot"?

500

This person is responsible for ensuring that your company's security is not compromised.

Who is EVERYONE?

500

This phrase means that data can only be accessed by the right person, at the right time, for the right purpose.

What is the principle of least privilege?

500

In 2017, this ransomware attack spread globally, demanding Bitcoin from victims. It disrupted critical services, including healthcare, and highlighted the importance of timely software updates.  

What is WannaCry?

500

This is the technique of gathering publicly available information about a target through their social media or other online platforms.

What is open-source intelligence (OSINT)?

500

CIA are the three core principles of information security: ensuring that data is kept private, accurate, and be there when you need it.

What are Confidentiality, Integrity, and Availability?

500

A programmer is selected to participate in a experiment in synthetic intelligence by evaluating the human qualities of a highly advanced humanoid AI. It explores security vulnerabilities that malicious AI could exploit.

What is "Ex-Machina"?