Broader term that encompasses all types of malicious software.
What is Malware?
Common signs of a phishing email include.
What are Misspellings, generic greetings, urgent language, suspicious links, and unexpected attachments?
Type of cybercrime that impersonates legitimate institutions to trick individuals into revealing sensitive information; often done through deceptive emails, text messages, or websites that appear trustworthy.
What is Phishing?
A set of changes applied to a software to improve its functionality, fix bugs, enhance security, or add new features - crucial for maintaining performance and security of one's software and devices.
What is Software Update?
In 2004, President George W. Bush declared __________ to be Cybersecurity Awareness Month.
What is October?
Malicious software designed to replicate itself and spread to other files or programs on a computer.
What is Virus?
Security tool that analyzes incoming emails, messages, and websites for signs of phishing activity - designed to protect users from malicious attacks by neutralizing suspicious emails.
What is Phishing Filter?
Manipulation technique that uses psychological tactics to manipulate users into providing confidential sensitive information.
What is Social Engineering?
Security measures that require users to provide two or more verification factors to gain access to an account.
What is Multi-factor Authentication (MFA)?
There are over _____ attacks each day which breaks down to nearly 1 cyberattack every 39 seconds.
What is 2,200?
Malicious software that encrypts files or locks users out of their system, demanding payment to restore access.
What is Ransomware?
Technique where attackers create a fake website that looks like a legitimate one to steal information.
What is Website Spoofing?
Type of cybercrime where attackers disguise communication to appear from a known and trusted source.
What is Spoofing?
Creating copies of important documents or files and storing them in a separate location to protect against data loss.
What are Regular Backups?
Yahoo's historic data breach in 2013 compromised __________ people in total.
What is 3 billion?
Malicious software that secretly monitors and collects information without a user's consent.
What is Spyware?
What is Whaling?
AI-generated forgeries that appear very real and have the potential to reshape public opinion and damage reputation.
What is Deepfake?
Service that creates a secure, encrypted connection between the user's device and the internet.
What is a Virtual Private Network (VPN)?
One of the most destructive viruses ever, _____ spread via email with the subject "I love you." It infected millions of computers worldwide, causing billions of dollars in damages.
What is ILOVEYOU?
Malicious software designed to display advertisements on a user's device in forms of pop-ups or banners that disrupts a user's browsing experience.
What is Adware?
This major company suffered a phishing attack in 2013 that compromised the data of 40 million customers.
What is Target?
Malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.
What is Distributed Denial-of-Service (DDoS)?
A network security that monitors and controls incoming and outgoing network traffic based on predetermined security rules - acts as a barrier between a trusted internal network and an unknown external network.
What is Firewall?
The _____ virus is considered the first computer virus. It was a self-replicating program that displayed the message, "I'M THE _____, CATCH ME IF YOU CAN" and spread across ARPANET.
What is Creeper?