“I’m the secret door that asks your name,
Type me right to join the game.”
USERNAME
“I live in your phone, both day and night,
Update me often to keep things right.”
SOFTWARE
“I’m the tiny code that sneaks inside,
Causing trouble you can’t hide.”
MALWARE
“I’m the guard who watches the gate,
Allowing users who authenticate.”
Security System
“I keep things secret when they go online,
Without me, your info’s mine.”
Encryption
“I close the holes that let attackers creep,
Apply me fast — I patch what’s weak.”
Patch
“I wrap your traffic in a private lane,
Hide your IP so snoops can’t gain.”
VPN
“I prove the site you see is truly right,
Signed by others to earn your sight.”
Certificate
“I ask you to click the hard-to-read art,
Show you’re human before you start.”
CAPTCHA
“I run unknown code in a tiny room,
So the real system avoids the doom.”
Sandbox
“I’m the fake webpage you think is true,
Type your password — I’ll steal it from you.”
Phishing Site
“I copy your keystrokes one by one,
When I’m done, your secrets are gone.”
Keylogger
“I’m a hacker’s army, controlled by one,
Together we attack until systems are done.”
Botnet
“I’m a hacker in disguise,
Testing systems to make them wise.”
White Hat
“I send you to a fake address without a hitch,
Your browser obeys — and hands over the switch.”
Pharming
“I give users only the access they truly need,
No extra power — that’s how I lead.”
Least Privilege
“I turn long data into a short fixed name,
One-way math keeps it safe — that’s my game.”
Hashing
“I stack many defenses so attackers slow down,
Multiple layers protect the crown.”
Defense-in-Depth
“I assume nothing is safe until checked and seen,
Every request is verified — no trust by routine.”
Zero Trust
“I prove a message came from you and can’t be denied,
A digital promise kept and certified.”
Non-repudiation
“I live inside systems, unseen and deep,
I wake when you rest, your secrets I keep.”
Rootkit
“I’m trusted code that turns unkind,
Attackers hide inside my kind.”
Supply Chain Attack
“I collect data from every device,
To find the threat before its slice.”
SIEM (Security Information and Event Management)
“I’m a hacker’s home inside your app,
I steal your data through a tiny gap.”
SQL Injection
“I attack machines that learn to see,
Turning AI against you and me.”
Adversarial Attack