Cybersecurity Basics
Cyber Threats
Cyber Tools
Cyber Best Practices
(In)famous Cyber Incidents
100

This is the process of converting information into a secure format, making it unreadable to unauthorized users

What is Encrpytion?

100

The broad term for people who try to gain access to computers beyond traditional means. Also sometimes called White Hat(s), or Black Hat(s)

Who are Hackers?

100

This software is designed to detect and remove malicious programs from your computer`

What is Antivirus Software?

100

This is the recommended number of characters in a secure password.

What is 12 to 16 characters?

100

In 2017, this ransomware attack infected hundreds of thousands of computers worldwide, exploiting a Vulnerability in Microsoft Windows.

What is WannaCry?

200

This is a deceptive attempt to acquire sensitive information by pretending to be a trustworthy entity, often via email.

What is Phishing?

200

A vulnerability in hardware or software that has not been previously identified by the vendor, and can be exploited by hackers.

What is a Zero-Day Exploit (or vulnerability)

200

A unique identifier that all employees have, and is a critical piece of intel needed by hackers, that is less secretive than a password.

What is an Account Name (Login ID)

200

This phrase to the practice of using two or more verification methods to log into a system.

What is Multi-Factor Authentication (MFA)?

200

In 2013, this major retail chain experienced a data breach that compromised the credit card information of over 40 million customers.

What is Target?

300

This is the practice of testing a system or network for weaknesses and vulnerabilities that could be exploited by an attacker.

What is Penetration Testing?

300

The use of personality, knowledge of human nature and social skills to steal passwords, keys, tokens or other credentials to gain access to systems.

What is Social Engineering?

300

A secure network protocol that encrypts data between a web browser and a server, indicated by "https" in the URL.

What is Secure Socket Layer (SSL) / Transport Layer Security (TSL)

300
A regular process of installing updates to fix security vulnerabilities is commonly called this

What is Patching (Patch Management)?

300

This social media platform suffered a massive data breach in 2018, exposing the personal information of 50 million users.

What is Facebook?

400

This type of malware locks users out of their systems or data and demands payment, often via cryptocurrency, to restore access.

What is Ransomware?

400

30% to 50% of all data lost can be attributed to this type of person, one who is already employed by the target company.

What is an Insider Threat?

400

This tool monitors and filters incoming and outgoing network traffic based on predetermined security rules

What is a Firewall?

400

This term refers to structured, state-sponsored groups dedicated to mapping out the internet addresses for the purpose of espionage and possible computer/network attacks.

What is State-Sponsored Hacking?

400
In 2014, in response to the release of the movie "The Interview, attackers allegedly from North Korea hacked this entertainment company. 

What is Sony Pictures?

500

A legal notification directing you or the bureau/office to preserve any documentary material that may be relevant to a pending or foreseeable lawsuit or administrative adjunction.

What is a Litigation Hold?

500

A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses. 

What is Standardization?

500

This tool scans a system for known open exploits using a constantly updated database.

What is a Vulnerability Scanner?

500

This is the first recommended action to take if you receive an unexpected email attachment or link from an unknown sender

What is Do Not Click on It (Do Not Open It)

500

In 2021, this cyberattack targeted a major U.S. pipeline operator, distrupting fuel supplies across the East Coast.

What is the Colonial Pipeline attack?