Cybersecurity Basics
Online Safety & Awareness
Hacks & History
Everyday Tech Security
Cyber Puzzles & Logic
100

This is what “cybersecurity” protects — your computers, phones, and networks from this.

What are attacks or hackers?

100

You should never click on suspicious links in this type of fake message pretending to be real.

What is phishing?

100

This term refers to a person who breaks into systems — sometimes for fun, sometimes for harm.

What is a hacker?

100

This kind of software helps protect your device by detecting and removing malware.

What is antivirus software?

100

If you use “password123” as your password, this kind of attack can easily guess it.

What is a brute-force attack?

200

The practice of using a secret word or phrase to access something securely.

What is a password?

200

It’s a good idea to change your passwords this often.

What is every few months (or regularly)?

200

The “ILOVEYOU” email virus first appeared in this decade.

What are the 2000s (specifically 2000)?

200

These characters (like @, #, and $) make your passwords harder to guess.

What are special characters?

200

This small device stores data and can spread malware if plugged into an unknown computer.

What is a USB drive (or flash drive)?

300

This is the process of converting data into a secret code to protect it.

What is encryption?

300

This type of code locks your files until you pay the attacker.

What is ransomware?

300

This kind of hacker helps companies find security flaws before bad guys do.

What is a white-hat hacker?

300

Before downloading a mobile app, it’s important to check this first.

What is the app’s permissions or reviews?

300

In this kind of scam, someone calls pretending to be tech support to steal your info.

What is vishing (voice phishing)/Social Engineering?

400

This term describes any software designed to harm your device.

What is malware?

400

Public Wi-Fi networks can be risky because your data can be this.

What is intercepted or stolen?

400

This was one of the first major breaches to expose millions of credit cards in 2013.

What is the Target data breach?

400

When websites show a little lock 🔒 next to the URL, it means the site uses this secure protocol.

What is HTTPS?

400

This simple rule: “Don’t share what you wouldn’t want public,” applies to this kind of platform.

What are social media sites?

500

The “CIA Triad” in cybersecurity stands for these three principles.

What are Confidentiality, Integrity, and Availability?

500

This extra step after your password, often a text or app code, adds another layer of protection.

What is multi-factor authentication (MFA) or two-factor authentication (2FA)?

500

The group known as “Anonymous” is famous for this type of cyber action.

What are hacktivist attacks (or hacktivism)?

500

This type of file backup keeps your data safe even if your computer is hacked.

What is a cloud backup or offline backup?

500

This type of attacks focuses on the weakest link in security, people.

What is Social Engineering?