This is the practice of defending computers and servers, mobile devices, electronic systems, networks, and data from malicious attacks.
What is cybersecurity.
Once the most wanted cyber criminal in the U.S., he was arrested in 1995 and later became a consultant and writer.
Who is Kevin Mitnick.
This technology, fundamental to web browsing, was invented in 1990 by Tim Bernese-Lee.
What is HTML.
A type of data storage technology that automatically makes copies of data in multiple places.
What is redundancy or backup.
This TV series, starring Rami Malik, focuses on a cybersecurity engineer and hacker with social anxiety disorder and clinical depression.
What is “Mr. Robot”.
A comprehensive plan for the recovery and continuation of vital technology infrastructure and systems following a natural or human-induced disaster.
What is a disaster recovery plan.
This hacker group is known for high-profile attacks against major corporations, and government entities, often with a political message.
Who is Anonymous.
Considered the first web browser, it was introduced in 1991.
What is the WorldWideWeb.
The process of obscuring data to make it unreadable without special knowledge, key, or password.
What is encryption.
A 1995 film starring Angelina Jolie and Jonny Lee Miller, focusing on a group of young hackers.
This security measure involves using physical characteristics, such as fingerprints or eye scans, to identify individuals.
What is biometrics.
Nicknamed the “Dark Dante,” he broke into dozens of high-profile computer systems in the late 1980s and early 1990s.
Who is Kevin Poulsen.
This was the original name for the internet when it was first developed in the 1960s.
What is ARPANET.
This cryptographic protocol is used to secure communications over a computer network.
What is SSL/TLS.
This novel by Dan Brown involves a sophisticated computer that breaks codes, threatening the security of U.S. intelligence.
What is “Digital Fortress”.
The C.I.A. Triad in cybersecurity stands for Confidentiality, Integrity, and this.
What is Availability.
This British hacker was accused of executing the biggest military computer hack of all time in the early 2000s.
Who is Gary McKinnon.
The first message ever sent over ARPANET, was this three-letter word.
A secure and distributed ledger technology used in cryptocurrencies.
What is blockchain.
A 2016 film where a CIA agent and his hacker friend summon their skills to uncover a major conspiracy.
What is “Jason Bourne”.
A sophisticated method that cyber criminals use to gain access to networks by bypassing regular authentications procedures.
What is a pass-the-hash attack.
Founder of the infamous Black Hat Briefings, he is a cybersecurity expert and hacker once known for his ability to ‘vanish’ digitally.
Who is Jeff Moss.
This company, a major player in the early days of personal computing, launched the first popular graphical browser in 1993.
What is Netscape Navigator.
The name of the algorithm that forms the basis of Google’s two factor authentication.
What is Time-based One-Time Password (TOTP) algorithm.
This popular video game series involves hacking and surveillance as a key part of its dystopian future setting.
What is “Watch Dogs”.