Cybersecurity Awareness & Digital Defense (2026)
Essential guide to modern digital security. Learn to identify AI-powered scams, understand Zero Trust principles, and master the tools needed to protect your personal and professional data in an era of advanced cyber threats.
Cards in this deck
What is "Phishing"?
A fraudulent attempt to steal sensitive data (passwords, credit card numbers) by disguised as a trustworthy entity in an email or message.
Define "Spear Phishing".
A highly targeted phishing attack that uses specific personal details about the victim to appear more convincing.
What is an "AI Deepfake Scam"?
Using AI-generated audio or video to impersonate a known person (like a CEO or family member) to trick someone into transferring money.
What is Multi-Factor Authentication (MFA)?
A security system that requires two or more separate forms of identification to access an account (e.g., password + code from an app).
Define "Social Engineering".
The psychological manipulation of people into performing actions or divulging confidential information.
What is "Ransomware"?
Malicious software that encrypts a user's files, with the attacker demanding a payment (ransom) to restore access.
What is a "Zero Trust" Architecture?
A security model based on the principle "never trust, always verify," requiring strict identity verification for every person and device.
Define "Smishing".
Phishing attacks conducted specifically through SMS (text messages) rather than email.
What is a "Password Manager"?
A software tool that generates, stores, and encrypts complex, unique passwords for all your online accounts.
What is "Vishing"?
Voice Phishing; using phone calls or VoIP to trick victims into giving up personal or financial information.
What is a "VPN" (Virtual Private Network)?
A service that creates a secure, encrypted connection between your device and the internet to hide your IP address and data.
Define "Public Wi-Fi Risks".
Unsecured networks that allow attackers to intercept your data (Man-in-the-Middle attacks) while you browse.
What is "Juice Jacking"?
A cyberattack where malware is installed or data is stolen from a device through a public USB charging port.
What is "Data Breach"?
An incident where sensitive, protected, or confidential data is copied, transmitted, or viewed by an unauthorized individual.
Define "Endpoint Security".
The practice of securing entry points of end-user devices (laptops, mobile phones) from being exploited by malicious actors.
What is "Passkeys"?
A modern replacement for passwords that uses your device’s local authentication (biometrics/PIN) to log into websites securely.
What is "Encryption"?
The process of converting information into a secret code that hides the information's true meaning from unauthorized viewers.
Define "Botnet".
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
What is "Shoulder Surfing"?
Looking over someone's shoulder to steal their PIN, password, or sensitive information while they use a device.
What is "Whaling"?
A form of spear phishing aimed specifically at high-level executives (the "big fish") of a company.
Define "DDoS Attack".
Distributed Denial of Service; an attempt to crash a website or server by flooding it with an overwhelming amount of traffic.
What is "Two-Factor Authentication" (2FA)?
A subset of MFA that specifically uses two different layers of security to verify a user's identity.