This type of malware encrypts a user’s files and demands payment for the decryption key.
What is ransomware?
This process involves converting data into a code to prevent unauthorized access.
What is encryption?
This 2013 breach exposed the personal information of over 3 billion accounts.
What is the Yahoo data breach?
This act, passed in 1996, is designed to protect the privacy of individuals’ health information.
What is HIPAA?
A unique string of characters used to identify a device on a network.
What is an IP address?
A type of attack where multiple compromised systems are used to target a single system, causing a denial of service.
What is a DDoS attack?
A security measure that requires two forms of identification before granting access.
What is two-factor authentication (2FA)?
A 2017 ransomware attack that affected over 200,000 computers in 150 countries.
What is WannaCry?
A 2018 regulation that strengthens data protection for individuals within the European Union.
What is GDPR?
This term refers to the practice of protecting systems, networks, and programs from digital attacks.
What is cybersecurity?
This type of phishing attack targets specific individuals or organizations with personalized messages.
What is spear phishing?
A network security system that monitors and controls incoming and outgoing network traffic.
What is a firewall?
This 2014 hack exposed the private emails of a major entertainment company.
What is the Sony Pictures hack?
This U.S. law, enacted in 2002, aims to improve the security of federal information systems.
What is FISMA?
A type of software designed to detect and remove viruses and other malicious software.
What is antivirus software?
A malicious program that disguises itself as legitimate software.
What is a Trojan horse?
This principle ensures that users only have access to the information and resources necessary for their job.
What is the principle of least privilege?
A 2016 breach that compromised the data of 57 million users and drivers.
What is the Uber data breach?
A 2015 act that encourages the sharing of cyber threat information between the private sector and the government.
What is CISA?
This term describes the process of finding and fixing security vulnerabilities in software.
What is patching?
This type of attack exploits a previously unknown vulnerability in software.
What is a zero-day attack?
A method of verifying the identity of a person or device, often using biometrics.
What is authentication?
This 2018 attack targeted a major social media platform, affecting 50 million users.
What is the Facebook data breach?
This act, passed in 1986, makes it illegal to access a computer without authorization.
What is the Computer Fraud and Abuse Act (CFAA)?
A secure network protocol used for remote login and other secure network services.
What is SSH (Secure Shell)?