Cyber Terms
Types of Hackers
Cyber Crimes
Protection & Prevention
CyberAttack Type
100

What is a password?

A secret word or phrase used to access data or systems.

100

What is a white hat hacker?

Ethical hacker who finds and fixes vulnerabilities.

100

What is identity theft?

When someone steals your personal information to pretend to be you.

100

What is antivirus software used for?

To detect and stop viruses/malware.

100

Trick you into giving personal info via fake emails or sites.

Phishing

200

Define "phishing"

A scam where someone tries to trick you into giving personal info by pretending to be legit.

200

What is a black hat hacker?

Criminal hacker with malicious intent.

200

Attacks on unknown security flaws before they’re fixed

Zero-day exploit

200

What is 2FA?

Short for two-factor authentication—adds extra layer of login security.

200

Malicious software that harms or takes over your device.

Malware

300

Define "firewall"

A tool that blocks unauthorized access to or from a network.

300

What is a gray hat hacker?

In-between hacker—may break in, but often without harmful intent.

300

What is social engineering?

Manipulating people into giving up confidential information.

300

How can you tell if a website is secure?

Look for HTTPS and a lock symbol in the browser.

300

Locks your files and demands money to unlock them.

Ransomware

400

Hacks databases by inserting malicious code into queries.

SQL Injection

400

What is a blue hat hacker?

Security testers hired to find bugs before a product launches.

400

What is medical identity theft?

When someone uses your name or insurance to get medical treatment.

400

How do strong passwords help?

They're harder to guess and reduce the chance of being hacked.

400

Floods a website with traffic to crash it and make it unusable.

DDoS

500

What are hashes & checksums used for?

To verify the integrity and authenticity of data/files.

500

What is a red hat hacker?

Vigilante hacker who attacks black hats and cybercriminals.

500

What is crypto jacking?

When hackers secretly use your computer’s resources to mine cryptocurrency.

500

Why is updating software important?

Updates patch security holes that hackers can exploit.

500

Hacker intercepts communication between two parties.

Man-in-the-middle