ATTACK
INFECTED
AM I PROTECTED
SECURITY ANALYST
CYBERCRIME
ILLEGAL ACTS
100

In cybersecurity, a V_____ refers to a malicious piece of computer code designed to spread from one device to another, replicating itself and potentially damaging data or disrupting system operations; essentially, it's a type of malware that can infect files and programs on a computer, often causing harm by altering system functions or stealing data

virus

100

Worm

100

            triple!

A well-known example of this type of malware is WannaCry, which spread rapidly across the globe in 2017, exploiting a vulnerability in Windows systems to encrypt user files and demand a cash payment to decrypt them; other examples include CryptoLocker and NotPetya, which also used encryption tactics to lock user data and demand payment to regain access

ransomware

100

______________  ____ of a computer is when someone accesses a computer system without permission or exceeds their authorized access. This can include gaining access to a computer, network, or data storage area

Unauthorized use

100

                        TRIPPLE!!

A _______ password is a combination of at least 12 characters, including a mix of uppercase and lowercase letters, numbers, and symbols, that is not easily guessable and does not contain personal information or common words, making it difficult for hackers to crack; essentially, a complex string of characters that is unique to each account you use.

strong
100

A ________  horse is a type of malware that disguises itself as a legitimate program to gain access to a user's computer system. The term comes from the Greek myth.

Trojan

200

Tripple!!!

S_________  E____________is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

Social engineering

200

Viruses, Worms, Spyware, Adware, Trojans, Rootkits, and Ransomware are all part of this umbrella: 

Malware

200

A common example of ____________ used in cybersecurity is fingerprint scanning, where a user's unique fingerprint pattern is scanned to verify their identity when accessing a device or online account, often seen on smartphones and laptops for login authentication.

Biometrics

200

            TRIPPLE!!!


A ________  __ in cybersecurity is a security expert who uses ethical hacking to identify and fix vulnerabilities in a system. These hackers are also known as ethical hackers.

White Hat
200

This refers to a software program designed to detect, quarantine, and remove malicious software (malware) like viruses, worms, Trojans, and spyware from a computer system, essentially protecting it from harmful digital threats by scanning files and systems for suspicious patterns and taking action to neutralize them; it is considered a crucial component of basic computer security and needs to be regularly updated to combat new malware variations.

antivirus

200

              DOUBBLE


What does WPA stands for? 

Wi-Fi Protected Access

300

Tripple!


P___________ is online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data. This is typically a two-step process that begins with an attacker installing malicious code on a victim's computer or server. 

Pharming

300

TRIPPLE!!!

Name five type of malwares

adware

botnet

spyware

Pharming

phishing

Ransomware

Rootkit

Scareware

Spyware

trojans

Virus 

worms

300

                             DOUBLE!!!

__________  ____ hackers spread dangerous ransomware that infected thousands of computers around the world.  Also known as a malicious cybercriminal who gains unauthorized access to computer systems and networks with the intent to cause harm, often by stealing sensitive data, disrupting systems, or extorting money, exploiting vulnerabilities in software or corporate systems for personal gain, and violating laws in the process. 

Black hat

300

An example of ________  ____ would be if someone used your Social Security number to open a credit card in your name without your knowledge or consent, leading to charges on the card that you didn't make; essentially, someone is using your personal information to make purchases or access services as if they were you.

identity theft

300

            Tripple!


__________ is a cyber attack that tricks users into clicking on something other than what they intended.

Clickjacking

300

                  TRIPPLE!

What does PIN stans for? 

Personal Identification Number

400

                  Double!


A __________ in cybersecurity is a type of malicious software that provides an attacker with privileged, administrator-level access to a computer while actively concealing its presence, essentially allowing them to operate on a system without being detected by the user or standard security tools; the term refers to the highest administrative level, essentially the "back door"

rootkit

400

                     DOUBLE!!!


One example of this method is sending a code to a user's mobile phone via text message, and this sending code from the site must be entered in addition to the password to log in. This created an extra layer of protection. 

2fa or two factor authentication

400

A __________ is used to monitor and control incoming and outgoing network traffic, acting as a barrier between a trusted internal network and untrusted external networks, essentially preventing unauthorized access and malicious traffic from entering a system by filtering data based on predetermined security rules; its primary purpose is to protect against cyberattacks and safeguard sensitive data within a network.

Firewall

400

A _________  ___  ___________ is when a user unknowingly downloads malicious software onto their computer simply by visiting a compromised website, often triggered by a hidden code within the webpage, without any active action on their part; for example, visiting a seemingly legitimate website that has been infiltrated by malware, causing an automatic download of a virus when the user browses the page, even if they don't click on anything suspicious.

drive by download

400

         TRIPPLE!

___________ is a method of protecting data by scrambling it with a mathematical formula so that only authorized users can access it (think of keys)

Encryption

400

S_______ is a cybercrime where someone or something impersonates a trusted source to gain access to sensitive information. Thia can take many forms, including fake emails, phone calls, websites, and text messages

spoofing

500

          Tripple!


__________ is a type of malware that displays unwanted advertisements on a device. It's designed to make money for its creator by displaying ads to users. Adware can be installed on computers and mobile devices

Adware

500

An example of an ____________   ___ ____________ could be a company guideline stating that employees can only use company-approved software on company devices, prohibiting the installation of unauthorized programs, and requiring them to protect sensitive data by not sharing passwords or accessing information not relevant to their job function; essentially outlining what constitutes appropriate use of company technology and what activities are considered unacceptable

acceptable use policy or aup

500

This type of malware that displays unwanted ads on a device. It can be delivered to a device through a variety of means, including downloading an app or clicking on a link on an untrustworthy website

ADWARE
500

This is a security standard that protects wireless networks from unauthorized access. It uses encryption and authentication methods to keep data safe

WPA or WIFI protected access

500

P__________ refers to a malware fraudulent practice where attackers send seemingly legitimate emails or messages, often disguised as coming from a trusted source, to trick users into revealing sensitive information like passwords, credit card details, or personal data, with the goal of stealing money or gaining unauthorized access to systems. 

Attackers use social engineering tactics to create convincing messages that appear to be from a reputable company like a bank, online retailer, or even a colleague, prompting the user to click on malicious links or provide personal information.


phishing

500

A ________ is a person who uses their technical knowledge to gain unauthorized access to computer systems or networks, often by exploiting vulnerabilities to steal data, disrupt operations, or cause damage.

Hacker or black hat

600

             double!!

P______________________ refers to when an unauthorized person gains access to a restricted system or area by following closely behind an authorized user, essentially "riding on their back" to bypass security measures and gain entry without proper credentials, often through physical means like following someone through a door without scanning their access card, or digitally by connecting to a network using another user's active connection.

piggybacking.

600

A common example of a d______  ___  _ S_________ attack is when a malicious actor floods a website with a large volume of traffic from multiple sources, effectively preventing legitimate users from accessing the site by overwhelming its server capacity, essentially "crashing" the website and making it unavailable to normal users; this traffic originates from many different locations

DOS OR DENIAL OF SERVICE

600

DOUBLE!!

S___________ is a type of malware that secretly collects and sends data from a user's computer to third parties without their consent. It can damage a device and monitor or control how the user uses it.

spyware

600

                         double!


A common example of a B________ is a network of compromised computers used to launch a Distributed Denial-of-Service (DDoS) attack, where a large volume of traffic is sent to a target website or server, effectively crashing it by overwhelming its capacity; a notorious example of this is the "Mirai"  which targeted various online services with massive traffic surges

botnet

600

P__________ a typical example is when a user types the URL of their bank's website into their browser and is unknowingly redirected to a fraudulent version of the site without realizing it. This can happen if malware on the user's computer or an exploited vulnerability in a system alters the settings

PHARMING

600

This is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications). Some applications, such as Microsoft Office, Excel, PowerPoint allow macro programs to be embedded in documents such that the macros are run automatically when the document is opened, and this provides a distinct mechanism by which malicious computer instructions can spread. This is one reason it can be dangerous to open unexpected attachments in e-mails.  

Macro Virus
1500

________ refers to unsolicited, bulk messages sent electronically, usually in the form of emails, that are often irrelevant or unwanted, typically used for advertising, phishing attempts, or spreading malware, and are sent to a large number of recipients without their consent; essentially, the digital equivalent of junk mail. 

Spam
1500

A _____________  _____ is a type of malware or hardware that records the keys a user types on a keyboard. Keyloggers can be used to steal sensitive information like passwords, credit card numbers, and other confidential data.

keystroke logger

1500

I___________   P_________  is the right to control how personal data is collected, used, and shared. It also refers to the policies and procedures that govern how people are involved in the process.

Information privacy

1500

         double!!


_______________refers to the act of actively searching for unsecured Wi-Fi networks while moving around in a vehicle, usually using a laptop or smartphone to detect and map these networks, often with the intent to exploit vulnerabilities and gain unauthorized access to them; essentially, it's like driving around to find open wireless networks that could be easily hacked into.

wardriving

1500

C__________ are small text files that websites send to your browser to store information about your visit. They can be a security risk if they are not properly designed or secured.

Cookies

1500

A _______  ___  ___ __________ attack is a cyberattack where a hacker intercepts communications between two parties to steal sensitive information. The attacker acts as a middleman, allowing them to access and manipulate data

man-in-the-middle or MITM