Encryption
Cyber Security
History
Online Algorithms
Fun Facts!
100
What is a shift cipher?

It is a cipher that shifts letters of the alphabet by a certain number to encrypt a message.

100

What is the name for software that is designed to harm devices and networks?

Malware

100

Who was said to have invented the Caesar cipher?

Julius Caesar

100

What is a cookie (online)?

A small piece of information stored about you by a website

100

What do you call a piece of code that can replicate itself and spread to other computers?

A computer virus
200

What ancient encryption method involves wrapping paper around different sized sticks?

A Scytale Cipher

200

What is phishing?

A cyber attack where someone tries to trick you into giving out personal information by pretending to be someone else.

200

What ancient civilization used Hieroglyphics as a form of writing?

Ancient Egyptian

200

What password should you never reuse?

Your email password

200

What type of malware holds a victim's data hostage until a ransom is paid?

Ransomware

300

What is Cybersecurity?

Cybersecurity is the practice of protecting computers, networks, and data from unauthorized access, attacks, or damage.

300

What is a trojan horse attack?

A cyber attack where malicious software disguises itself as a trustworthy program.

300

Who cracked the Enigma machine?

Alan Turing

300

True or false: You should click links in emails that you don't know the sender of to check their safety.

False

300

Name the writing script that ancient Egyptians used that we are still trying to decipher today?

Hieroglyphics

400

Why do we use use encryption?

To protect information and keep it safe from unauthorized people.

400

What is a firewall used for?

It is used to block unauthorized attacks to a network.
400

What was the name of the cryptography machine used in WW2?

The Enigma Machine

400
what do we call someone with the computer skills to gain access to computer systems or networks

a hacker

400

What is malware?

Malicious/dangerous software designed to harm devices, networks and computers.

500

What does it mean to decrypt?

To translate secret messages back into their original form.

500

What are the 3 rules of a strong password?

Combination of:

- letters

- numbers

- symbols

500

What is the difference between a Caesar cipher and a regular shift cipher?

A Caesar cipher is shifted by exactly 2 spaces

500

what popular baked good is also found on websites as a security tool?

Cookies

500

What popular game involves building things with blocks?

Minecraft