Security Fundamentals & Technologies
Phishing & Social Engineering Attacks
Malware & Vulnerabilities
Risk Management & Frameworks
Emerging Threats & Industry Trends
100

MFA is short for this security measure; would you like that code sent via Email or Text?

What is Multi-Factor Authentication

100

Cybercriminals doing this are "angling" to get confidential info from you like credit card numbers

What is Phishing

100

It's the term for malicious software that holds data "hostage" until a payment is made--or until Mel Gibson gets it back for you

What is Ransomware

100

This is a qualitative or quantitative estimate of potential impact from a threat or hazard related to a recognized vulnerability

What is a risk assessment

100

Coined in 2017 this term refers to the re-creation of a person's appearance or voice through artificial intelligence

What is Deepfake

200

From a word for "hidden", it's the process of making digital data unreadable to the unauthorized

What is Encryption

200

This type of phishing attack is directed at specific individuals using personal and company information gathered from social media

What is Spear phishing

200

Beware of these types of programs that track every stroke you make while typing in an effort to glean your password

What is Keylogging

200

Something every organization must have in place to properly respond to a cyber incident

What is an incident response plan

200

An incorrect or fabricated response from a large language model or AI chatbot

What is AI hallucination

300

Those inscrutable letter combos and pesky login puzzles. Two examples of these tools, which discern real users from bots

What is CAPTCHA

300

This type of phishing attack – or is it a mammalian attack? – targets high profile individuals in an organization

What is Whaling

300

In this cybercrime business model one criminal gang sells code or malware to other hackers, who then use it to carry out cyberattacks

What is Ransomware as a Service (RaaS)

300

This NIST information security policy framework helps private sector organizations improve their ability to prevent, detect, and respond to cyber-attacks

What is the NIST Cybersecurity Framework (CSF)

300

This popular chatty large language model (LLM) enables cybercriminals to easily write malicious code

What is ChatGPT

400

In real life, it can slow the spread of flames and smoke; in your digital life, it blocks unauthorized access to your private data

What is a Firewall

400

This type of social engineering attack (phish) uses the phone to gain personal and financial information

What is Vishing

400

This type of previously unknown software vulnerability gives hackers a window of opportunity to exploit systems before developers can create and distribute a patch

What is a zero-day vulnerability

400

An organization may choose to offset costs associated with cyber related incidents by transferring risk through this method

What is cyber insurance

400

This industry was the most frequently targeted by cybercriminals in 2023, outpacing healthcare, government, and critical infrastructure

What is the finance industry

500

Companies consider cybersecurity when instructing employees with a policy on BYOD, short for this

What is Bring Your Own Device

500

This type of attack sends a SMS text message attempting to steal critical information or to install malware on the device

What is Smishing

500

Ethical hackers, also called by this headgear, use their skills to identify security risks

What is White-hat

500

This type of email attack, targeting both businesses and individuals, resulted in adjusted losses of over $2.9b in 2023

What is Business Email Compromise (BEC)

500

Losses related to this financial scam were the highest of any crime type in 2023, seeing a 38% increase in just one year

What is investment scams

M
e
n
u