Social Media
Cybersecurity Lingo
Think Like a Hacker
Women in Cybersecurity
I Got Hacked!
100

throwing a personal info party and hackers are the uninvited guests!

What is oversharing on social media?

100

It's all about shielding our computers, networks, and data from the sneaky cyber-baddies who want to mess things up or steal information.

What is cybersecurity?

100

 a part of the internet that's intentionally hidden and only accessible with special software

What is the darknet?

100

The tech field needs more girl power, and cybersecurity is no exception

What is we need more Wonder Women in Cybersecurity?

100

My sister is a computer engineer

Who is Amelia A.

200

when someone publishes private information about someone else online, usually for malicious purposes. It's like airing someone's dirty laundry in public.

What is doxxing?

200

It's software that's up to no good, causing harm to computers and networks. Think of it as the playground bully of the internet.

What is malware?

200

often unsecured, which means they can snoop on data being sent over the network. It's like peeking at someone else's secret notes!

What is the public WiFi?

200

She wrote the world's first computer program way before computers were cool.

Who is Ada Lovelace, a real OG (Original Geek)?

200

Merging my art and gaming skills to establish a career in computer science 

Who is Karina A.

300

It's a sneaky way hackers try to trick you into handing over your personal information, using fake emails and websites.

What is phishing?

300

Google's 'Security Princess'

Who is Parisa Tabriz?

300

Vice president of the National English Honor Society

Who is Kasaa B.

400

it does add an extra step to your log-in routine. It's an added layer of security that makes it tougher for hackers to break into your accounts.

What is two-factor authentication (2FA)?

400

Won first place for her cannoli recipe

Who is Veronica 

500

A way of turning readable data into secret code to stop unauthorized peeps from taking a peek.

What's encryption?