Password Security
Protecting Oneself
Malware
Network Security
Our Class
100

This is the minimum recommended length for a strong password.

What is 12 characters?

100

This fraudulent practice involves sending emails that appear to be from reputable sources to steal sensitive information.


What is phishing?

100

This type of malicious software replicates itself and spreads to other computers.

What is a virus or worm?

100

This security system monitors and controls incoming and outgoing network traffic based on predetermined rules.

What is a firewall?

100

Every group selected this option as an authentication method for entering the school.

What is smart card authentication?

200

This type of attack tries every possible combination of characters to crack a password.

What is a brute force attack?

200

This practice involves creating copies of important data to prevent loss from attacks or hardware failure.

What is backing up data or creating backups?

200

This malware encrypts your files and demands payment for the decryption key.

What is ransomware?

200

This protocol encrypts web traffic and is indicated by a padlock icon in your browser.

What is HTTPS (HTTP Secure) or SSL/TLS?

200

Everyone learned about this choice piece of clothing that Mr. P wears through a very questionable query posed by a student.

What is an undershirt?

300

This authentication method requires two different forms of verification to access an account.

What is two-factor authentication (2FA) or multi-factor authentication (MFA)?

300

You should do this regularly to ensure your software has the latest security patches.

What is updating or patching software?

300

This type of malware disguises itself as legitimate software but contains malicious code.

What is a Trojan horse or Trojan?

300

This tool can be used to read inside the contents of packets

What is wireshark?

300

The class established that as a group they would be highly effective at performing this illegal activity.

What is robbing a bank?

400

This technique uses a list of commonly used passwords to attempt unauthorized access.

What is a dictionary attack?

400

This type of information should never be shared on social media as it can be used to answer security questions or steal your identity.

What is personal information (e.g., birthdate, address, phone number, mother's maiden name)?

400

This attack floods a network or server with traffic to make it unavailable to users.

What is a DDoS (Distributed Denial of Service) attack?

400

This set of rules dictates how devices speak to one another with a specific service - usually including specific ports

What are protocols?

400

During each class there is an apparent rip in the space/time continuum where we agree to a specific amount of time, but some take advantage and go way beyond that ಠ_ಠ 

What is 5 minutes?

500

This cryptographic function converts passwords into fixed-length strings and is designed to be slow to prevent brute force attacks.

What is a password hashing algorithm (e.g., bcrypt, Argon2)?

500

This practice involves attackers gathering information about targets from their social media profiles to craft convincing phishing attacks or impersonate them.

What is social media reconnaissance or OSINT (Open Source Intelligence)?

500

This sophisticated malware can hide its presence by modifying operating system functions and is extremely difficult to detect.

What is a rootkit?

500

It is incredibly important to perform this on sensitive information, otherwise someone could intercept and read the contents of packets in clear text.

What is encryption?

500

We performed some OSINT on this individual in class including reviewing their Instagram posts and Zillow.

Who is Tony Stark?