Malicious software designed to harm or exploit a system, device, or network.
What is malware?
This may result in a scam, virus or malware download to your computer.
What is clicking on an unknown link or website?
A mix of letters, numbers, and symbols - not easy to guess.
What makes a strong password?
A secure version of HTTP - encrypts data between browser and website.
What is HTTPS?
Another word for programs and applications that run on a computer or device.
What is software?
A scam where attackers trick people into giving personal information through fake emails or messages.
What is phishing?
Don't click anything - report or delete it.
What should you do if you receive a suspicious email?
A login method using a password and a second form of ID.
What is multi-factor authentication?
A security system that blocks unauthorized access to or from a network.
What is a firewall?
A unique number that identifies a device on a network.
What is an IP address?
A scam where attackers use text messages (SMS) to trick individuals into clicking on malicious links, downloading malware, or sharing sensitive information.
What is Smishing?
Preventing others from accessing your accounts.
Why is it important to log out of public/shared devices?
If one gets hacked, all of your accounts are at risk.
Why shouldn't you use the same password for all accounts?
To create a secure, private connection over the internet.
What is VPN used for?
Scrambling data so only authorized user can read it.
What is encryption?
Distributed Denial of Service - flooding a server with traffic making it unable to respond.
What is a DDoS attack?
The trail of data you leave behind online.
What is known as a digital footprint?
A tool that stores and creates strong passwords for your accounts.
What is a password manager?
Intercepting data as it travels over a network.
What is packet sniffing?
A file that proves a website is secure and trustworthy.
What is a digital certificate?
A security flaw that hackers exploit before developers can fix it.
What is a zero-day exploit?
Tricking people into giving up confidential information by manipulating them.
What is social engineering?
Using physical traits like fingerprints or face ID to log in.
What is biometric authentication?
Redirecting a website's traffic to a fake site by corrupting DNS data.
What is DNS poisoning?
Security Information & Event Management is used to monitor and analyze security events.
What is a SIEM?