Types of Hacking/Hacking
Vocabulary
Prevention & Safety
100

Fake emails or messages that trick people into giving passwords.

What is phising?

100

When people say an action is reasonable or acceptable because there are good reasons for it.

What is justified?

100

A secret combination of characters used to verify your identity and grant access to a computer system.

What is a password?

200

Trying many passwords until one works.

What is password attacking? (or "brute forcing")

200

To reveal hidden information.

What is expose?

200

A second verification step (code/text/app) in addition to a password.

What is two-factor authentication (2FA)?

300

Malicious hackers who steal or damage for profit.

What is black-hat hacking?

300

Dishonest or illegal behavior by powerful people or institutions.

What is corruption?

300

Instead of public USB ports, carry this portable charger.

What is a power bank?

400

Bad software that steals data, locks files, or spies on you.

What is Malware?

400

Private and meant to be kept secret — often used to describe documents or information that should not be shared.

What is confidential?

400

Keep copies of important files so you can restore them after an attack.

What is a backup?

500

A physical attack using a tampered public USB port to steal data from phones.

What is juice jacking?

500

To put something at risk or in danger.

What is jeopardize?

500

Use secure websites and protect public Wi-Fi traffic with this tool.

What is a VPN?