What does it mean when someone “hacks” a system?
They access it without permission.
What is a password used for?
To prove who you are.
What is malware?
Software designed to cause harm.
What 2 "conditions" need to be present to form a network?
1). Devices must be connected somehow.
2). Devices are sharing data.
What should you do if something online feels wrong?
Stop and tell a trusted adult.
Why are old or outdated programs risky to keep using?
They may have security holes hackers know about.
Which is stronger: “soccer12” or “S0ccer!92Blue”?
“S0ccer!92Blue”
Why do hackers disguise malware as games or tools?
To trick user into installing it.
Why is public Wi-Fi risky for passwords?
Others can intercept data.
Why is reporting cyber problems quickly important?
To limit damage.
A website lets users type anything into a form without checking what was typed in. Why is that dangerous?
Hackers can insert harmful code that could "break" the form and allow a hack.
Why is using the same password everywhere risky?
If one account is hacked, others can be too.
How can malware get onto a device?
Through bad links, downloads, or attachments.
What is the main purpose of a firewall?
Block unwanted traffic.
What does “think before you click” really mean?
Pause and check first.
A Red Hat Hacker is someone
What does two-factor authentication (2FA) add beyond an initial password one has to enter?
A second proof of identity.
Why are “free” programs from unknown websites risky?
They may hide malware.
What is the most important reason why data needs to be backed up?
So it can be restored after an attack.
A login happens at 3:00 a.m. for a student account. Why is that suspicious?
It’s unusual and may mean the account was hacked by someone overseas on a different timezone.
A hacker breaks in using a feature that was meant to HELP users. What is that called?
A hacker gets your password but still can’t log in. What security feature stopped them?
Two-factor authentication.
Ransomware
When encrypted data is stolen, how can the data still deny the thief access to it?
It has to be decrypted with a key.
What is the FIRST step after discovering a cyber attack?
Identify what happened.