This acronym in a web address indicates that the site uses a secure, encrypted connection to protect data between your browser and the server.
What is HTTPS (HyperText Transfer Protocol Secure)?
This type of software is designed to damage, disrupt, or gain unauthorized access to a computer system.
What is Malware?
This kind of password uses letters, numbers, and symbols to stay secure.
What is strong password?
She founded WiCYS in 2013.
Who is Dr. Ambareen Siraji?
Attempting to trick someone into revealing personal information via email is called this.
What is Phishing?
This is the unique string of numbers assigned to each device connected to the internet.
What is IP address?
This device filters network traffic to prevent unauthorized access.
What is firewall?
Before posting online, you should always check these settings to control who can see your information.
What are privacy settings?
She's known as the world's first computer programmer.
Who is Ada Lovelace?
Unwanted advertisements that appear on your computer are caused by this type of malware.
What is Adware?
This malicious software often disguises itself as a legitimate program to trick users into installing it.
What is Trojan horse?
An attack that floods a user with texts or messages to trick them into clicking a malicious link.
What is Smishing?
This feature adds an extra step when logging in to keep your account safe.
What is two-factor authentication?
U.S Navy rear admiral, "Amazing Grace", helped create COBOL (Common Business-Oriented Language).
Who is Grace Hopper?
Hackers who exploit security vulnerabilities to help organizations improve security are called this.
What is Ethical hackers?
This is the process of converting data into a coded form to prevent unauthorized access.
What is Encryption?
A malware program that activates only when certain conditions are met, like a date or action.
What is Logic bomb?
You should always use this type of connection when working on public Wi-Fi.
What is VPN (Virtual Private Network)?
The first WiCYS conference was held at this U.S university?
What is Tennessee Tech University?
Exploiting weak passwords across multiple accounts to gain access is called this type of attack.
What is Credential stuffing?
This cryptographic weakness occurs when two different inputs give the same hash value.
What is Collision attack?
Malware that changes its code structure automatically to evade antivirus detection.
What is Polymorphic malware?
This word describes all the information that stays online posts, photos, and accounts.
What is digital footprint?
In 2025, WiCYS introduced a new program highlighting women speakers in cybersecurity.
What is the Speakers Spotlight Program?
This company suffered one of the largest data breaches in history in 2017, exposing personal information of over 140 million people.
What is Equifax?