I'm told I need to stop clicking on things from strangers, but I just love being surprised!
What is Phishing?
This software locks up your files until you pay up, but it’s really just asking for a "digital loan."
What is Ransomware?
I installed this to keep bad traffic out, but it just sits there silently judging every packet that tries to get in.
What is a Firewall?
This makes your data scramble, but unlike your laundry, it's designed to be confusing.
What is Encryption?
The internets phone book
What do you call a hacker who impersonates a system admin to get your password, but always forgets their own?
What is an Impersonator?
This malicious program is like a guest who pretends to be friendly, but once inside, causes chaos behind your back.
What is a Trojan Horse?
This is what happens when a hacker tries to browse the internet without permission on your network; they are trespassing.
What is Unauthorized Access?
This mathematical function is one-way, you can make the fingerprint, but you can't recreate the hand.
What is a Hash Function?
What is ACL?
This specific attack is so personal, it feels like the attacker knows my dog's name and my favorite pizza topping.
What is Spear Phishing?
I accidentally ran an attachment that started sending copies of itself to everyone in my contacts. It was just trying to make friends!
What is a Worm?
A hacker found the secret handshake and used it to get into the server room.
What is a Private Key
or Secret Key?
This type of encryption uses the same secret key to both encrypt and decrypt data, making it fast but harder to share securely.
What is Symmetric Encryption?
Where public vulnerability IDs live
What is CVE?
This cybersecurity principle focuses on maintaining uninterrupted access to data and services, even during failures or attacks, often supported by redundancy and disaster-recovery planning
What is Availability?
This malware waits for a specific date or condition to execute, like a delayed-fuse prank.
What is a Logic Bomb?
When a threat actor is actively poking around looking for an open door, they are performing this type of reconnaissance.
What is Scanning or Footprinting?
This hashing property means that even a tiny change in input produces a drastically different output, helping protect data integrity.
What is Avalanche effect??
Keeps unauthorized devices off the network
What is NAC?
This access-management model assigns permissions based on a user’s job function, reducing individual privilege decisions and simplifying administration.
What is Role-Based Access Control (RBAC)?
My defense tools can't find it because it lives only in memory. It's the cybersecurity equivalent of a ghost program.
What is Fileless Malware?
I set up this separate, segmented environment that looks like a real network, hoping the hackers get stuck in the tar pit.
What is a Honeypot?
This technique combines plaintext with a random value before hashing, making it much harder for attackers to use precomputed tables to crack passwords.
What is Salting??????????????????
What does NIST CSF stand for
What is National Institute of Standards and Technology Cybersecurity Framework