This is the unauthorized access, disruption, or damage to computer systems or networks.
What is a cyber attack?
This attack tricks people into revealing confidential information by pretending to be trustworthy.
What is phishing?
This technique uses fake emails to lure victims.
What is email spoofing?
This 2017 ransomware attack affected systems worldwide, including hospitals.
What is WannaCry?
This software detects and removes malicious programs.
What is antivirus software?
The individual or group that launches a cyber attack is called this.
Who is a hacker?
This attack locks a user’s files and demands payment to unlock them.
What is ransomware?
Attackers exploit weaknesses in software through this type of error.
What is a vulnerability?
This attack targeted the Ukrainian power grid and caused blackouts.
What is the BlackEnergy attack?
A strong example of this includes upper/lowercase, numbers, and symbols
What is a strong password?
This common target of cyber attacks stores sensitive user data and processes transactions.
What is a server?
This type of attack monitors and captures keystrokes to steal data.
What is a keylogger?
This technique involves injecting malicious code into forms or URLs.
What is SQL injection?
A major data breach at this credit reporting agency exposed data of over 140 million people.
What is Equifax?
This is the practice of verifying identity before granting system access.
What is authentication?
This term refers to stealing personal data to impersonate someone online.
What is identity theft?
A virus that replicates itself and spreads across networks is called this.
What is a worm?
The act of secretly observing someone's device usage or screen.
What is shoulder surfing?
In 2020, this US government software vendor was compromised in a major supply chain attack.
What is SolarWinds?
This device filters incoming and outgoing network traffic.
What is a firewall?
This is a coordinated cyber attack involving multiple systems overwhelming a target system.
What is a Distributed Denial of Service (DDoS) attack?
An attack where malicious code is inserted into a trusted website to infect visitors.
What is a drive-by download attack?
A cyber attack that occurs before the software flaw is known by the vendor.
What is a zero-day attack?
This highly sophisticated worm targeted Iranian nuclear facilities.
What is Stuxnet?
This principle ensures users only have access necessary for their role.
What is the principle of least privilege?