This term refers to the practice of protecting computer systems, networks, and data from digital attacks, theft, and damage.
What is cybersecurity?
An operative on the red team does this.
What is an attack?
A type of cybersecurity tool that is designed to detect and remove malicious software (malware) from computer systems.
What is antivirus software?
A type of cyber attack that involves trying every possible password combination until the correct one is found.
What is a brute force attack?
Group of individuals who perform an analysis of information systems to ensure security, identify security flaws, verify the effectiveness of each security measure, and to make certain all security measures will continue to be effective after implementation.
What is a blue team?
This is a secret code that is used to protect access to a computer, account, or other digital resource.
What is a password?
A type of security assessment that involves identifying potential vulnerabilities in computer systems and networks.
What is a vulnerability assessment?
A type of cybersecurity tool that is designed to monitor and control incoming and outgoing network traffic.
What is a firewall?
A type of cyber attack that involves manipulating people into performing certain actions or divulging sensitive information.
What is social engineering?
Alexandre Menguy
Who is our Chief Information Security Officer (CISO)?
A form of authentication using two devices.
What is two-factor authentication?
A practice where companies offer rewards to ethical hackers who find and report security vulnerabilities in their software or systems.
What is bug bounty hunting?
A type of cybersecurity tool that is designed to securely store and manage passwords.
What is a password manager?
A type of cyber attack that involves overwhelming a computer system or network with a flood of traffic from multiple sources, making it unavailable to users.
What is a DDos Attack?
This security principle is based on the idea of providing users with the minimum amount of access necessary to perform their job functions.
What is the principle of least privilege?
This type of cyber attack is designed to prevent users from accessing their own computer systems or files until a ransom is paid.
What is a ransomware attack?
Authorized attempt to gain unauthorized access to a computer system, application, or data.
What is Ethical Hacking?
This security tool is designed to detect and prevent unauthorized access to computer systems and networks by monitoring network traffic and blocking suspicious or malicious traffic.
What is an intrusion prevention system (IPS)?
A type of cyber attack that involves gaining unauthorized access to a computer system or network by exploiting a vulnerability or installing a hidden means of access.
What is a backdoor?
This type of cybersecurity defense strategy involves regularly testing the security of computer systems and networks to identify vulnerabilities and potential weaknesses before they can be exploited by attackers.
What is vulnerability scanning and testing?
A type of scam email that is designed to trick the recipient into giving up sensitive information, such as login credentials or financial information.
What is a phishing email?
A type of security assessment that involves simulating a real-world cyber attack, in order to identify vulnerabilities and weaknesses in computer systems and networks.
What is penetration testing?
Tool that helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet.
What is a web application firewall (WAF)?
A type of cyber attack where the attacker intercepts communication between two parties to eavesdrop, steal information, or manipulate the conversation.
What is a "man-in-the-middle" attack?
A computer system or network that is designed to look vulnerable and attract attackers, in order to gather information about their methods and motives.
What is a honeypot?