This common scam uses deceptive emails to lure victims into revealing private info.
What is Phishing?
This digital "wall" blocks unauthorized access to your private data.
What is a Firewall?
This tech giant, founded in a garage, celebrated its 50th anniversary on April 1, 2026.
What is Apple?
Using a fingerprint or facial scan to verify identity is this type of authentication.
What is Biometric?
This acronym supports the Confidentiality, Integrity, and Availability triad.
What is CIA?
This malware holds your data hostage until a payment is made.
Ransomware?
Software that creates a secure, encrypted tunnel over the internet is known as this.
What is a VPN?
In 1971, Ray Tomlinson sent the first-ever one of these and introduced the "@" symbol.
What is an Email?
This method requires two or more forms of evidence to grant access to an account.
What is MFA or 2FA?
This "hidden" process makes digital data unreadable to unauthorized users.
What is Encryption?
This type of attack overwhelms a system with traffic to crash it.
What is a DoS/DDoS attack?
These professionals are hired to legally find vulnerabilities in a system.
Who are Ethical Hackers?
This decade was when the internet first became widely popular with the public.
What are the 1990s?
This protocol allows a user to access multiple systems with just one set of credentials.
What is Single Sign-On / SSO?
An attack where data is written beyond allocated memory areas is known as this.
What is a Buffer Overflow?
Malware that disguises itself as legitimate software to gain remote control is called this.
What is a Trojan Horse?
This defense strategy uses overlapping layers of security to protect data.
What is Defense in Depth?
Released in 1991, the very first page on the World Wide Web was about this topic.
What is the Web / its own technology?
This newer protocol (AAAs) provides more reliable communication than its predecessor, RADIUS.
What is Diameter? While RADIUS is widely used for network access, its reliance on UDP makes it less reliable. Diameter addresses this by utilizing TCP or SCTP (Stream Control Transmission Protocol) to ensure reliable packet delivery.
This 1975 algorithm from IBM became the first Encryption Standard for the U.S.
What is DES?
An "On-Path" attack specifically designed to capture 2-step SMS messages is called this.
What is Man-in-the-Mobile / MITMO?
This specific type of server provides security, privacy, and web filtering for a network.
What is a Proxy Server?
In 1969, the first ARPANET connection crashed after only these two letters were typed.
What are L and O? UCLA student programmer Charley Kline attempted to type "LOGIN" to a computer at the Stanford Research Institute (SRI), but the system crashed after the 'L' and 'O' were received.
This authentication factor is categorized as "something you have" (e.g., a physical key).
What is a Token?
Google researchers discovered these two CPU vulnerabilities in January 2018 affecting almost all processors.
What are Spectre and Meltdown?