Be Sociable
Phishing
Protecting Home Devices
Malware
Cyber Potpourri
100

These are websites and applications that enable users to create and share content or to participate in social networking.

What is social media?

100

An intentional deception for either personal gain or to damage another individual by means of electronic communication. The fraud can take the form of a "con game", or scam.

What is an email scam?

100

Everyday objects made intelligent with computing power and connected to the Internet. 

What are Smart Devices?

100

This is a computer program malware that spreads or self-replicates and requires user interaction to activate.

What is a virus?

100

What behavior should you do on your device before stepping away.

What is lock it?

200

A platform for electronically communicating through the Internet with friends or the name of 2010 movie about Mark Zuckerberg.

What is "The Social Network"

200

Elements such as poor spelling, grammar, suspicious or inconsistent links and urgency are all examples of this.

What are things you should look for in an email that may indicate it is a scam?

200

This image next to the web address or URL (uniform resource locator) indicates you are on a secure website.

What is the lock icon?

200

It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is designed to give hackers access to your computer or files.

What is a Trojan Horse?

200

The process of stealing your personal information — like your name, address, Social Security, Driver's License, Credit Card number and email address — and using it to purchase goods, open accounts, withdraw money from bank accounts without your consent.

What is Identity Theft?

300

A popular cloud Computing Platform that is also inspired by the name of a famous rain forest.

What is AWS - or Amazon Web Services

300

A claim that there is a "problem" with your account, or a request to "verify your identity", update personal information such as password, credit card, social security or bank account numbers.

What are examples of a phishing email?

300

A piece of portable electronic equipment that can connect to the internet, especially a smartphone or tablet computer.

What are mobile devices?

300

A form of malware that encrypts a victim's files and demands a payment from the victim to restore access to the data.

What is Ransomware?

300

Consists of upper and lowercase letters, numbers, special characters, easy to remember but hard to guess, never shared with anyone, and never written down and left near your computer.

What is a strong password?

400

A type of social engineering attack often used to steal user data, including login credentials and credit card numbers.

What is phishing or a phishing attack?

400

The most commonly used type of email attack or a popular water sport in Hawaii.

What is Spear Phishing?

400

Flash drive with classified data on it left unsecured is an example of this.

What is a potential cyber security or data breach?

400

A program that tracks where you go on the Internet or on your device.

What is spyware?

400

The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.

What is cyber security?

500

The use of deception to manipulate individuals into divulging confidential or personal information for fraudulent purposes (i.e. impersonation via telephone, in person, or email.)

What is social engineering?

500

An authentication method that requires the user to provide two or more verification factors to gain access to a resource, such as an application or online account.

What is Multi-Factor Authentication (MFA)?

500

This refers to a growing network of connected objects that are able to collect and exchange data using embedded sensors. Smart devices, like thermostats, cars, lights, refrigerators, and more appliances can all be connected to the this.

What is IOT - Internet of Things?

500

Erratic computer behavior, lack of response to keyboard or mouse commands, crashing or restarting on its own, or running slower than usual are potential symptoms of this.

What is a computer virus or malware?

500

The use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.

What is Hacktivism?