Hacking
Codes
The begining of computers
ware
Cybersecurity Lab
100
To figure out Tim's adress.
What is the thing that the identity-theft crime ring used Tim's photo for?
100
You use this to protect your privacy so only your friends can see it and not your enemies?
What is codes?
100
When to or more computers could talk to one another
What is When did the first network develop?
100
Computer programs that can block, detect, and remove viruses and other malware.
What is the definition of Antivirus software
100
Extra copy's of computer files that can be used to restore files that or lost and damaged
What is backups
200
Sent it to an advertising firm so therefore Tim got frisbee ads.
What is the thing that the social media did with Tim's photo?
200
Codes are not just for emperors and soldiers today we use them to shop online and say hi to your friends.
What is the people that use codes?
200
1980
What is When did personal computers emerge?
200
A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.
What is Ransomware
200
A data storage device that is used to store, back up, and transfer computer files.
What is a USB drive
300
Hackers hack to make discoveries, protect information, steal info and money, and to expose corruption.
What is the reason why hackers hack?
300
Avoid unsecured public WiFi or your messages can be easily intercepted.
What is to be avoided?
300
Email play games send money reading news
What is • What do people do on the computers?
300
Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs..
What is malware
300
A data storage device that is used to store, back up, and transfer computer files.
What is USB port
400
Creative problem solving that takes advantage of computers and networks.
What is computer hacking?
400
Public-key cryptography is regularly used for secure online communication.
What is regularly used for public-key cryptography?
400
Phones, car elevators.
What is • What other devices started to talk to the network?
400
A program that records every key struck on a keyboard and sends that information to an attacker.
What is the definition of Keylogger malware
400
A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
What is Software patch
500
Greed, fame, rebellion, or the desire to hurt people with cheap thrills.
What is the motivation for hackers to hack?
500
Some websites encrypt their traffic, you can tell by looking at the lock symbol on the URL, if its not their anything you type on the website can be intercepted.
What is a way you can check if the website encrypt their traffic?
500
Viruses’ malware and steal identity
What is • What price had to come do to computers?
500
Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
What isPhishing
500
Consists of code written in a programming language that instructs computers to perform specific tasks.
What is Software