The "C" in the CIA Triad stands for this principle, which ensures that data is accessible only to authorized users.
Confidentiality
This fraudulent practice uses deceptive emails to trick people into revealing personal information, like passwords.
phishing
A set of rules that defines how users can and cannot use an organization's computer systems.
Acceptable Use Policy
A piece of software that protects a computer from viruses.
antivirus software
These people break into computer systems with malicious intent.
black-hat hackers
The "I" in the CIA Triad refers to this principle, which ensures that data is not modified or tampered with by unauthorized parties
Integrity
This type of malware encrypts your files and demands a payment to restore them.
ransomware
This is the best way to protect your laptop when you leave it unattended, even for a short time.
to lock your screen or log off
Using something you know (a password) and something you have (a code sent via text) is an example of this
multifactor authentication (MFA)
These ethical hackers test the security of systems to identify vulnerabilities
white-hat hackers
This part of the CIA Triad ensures that systems and data are available when authorized users need them.
Availability
A seemingly harmless program that conceals malicious code, named after a story in Greek mythology.
Trojan
What you should do with an email attachment if it comes from an unknown sender?
to not open it
The process of making digital data unreadable to unauthorized individuals.
encryption
What is an organization's plan for how to handle security breaches when they happen?
an incident response plan
What is an organization's first line of defense, described as the weakest link in the security chain if not properly trained?
the human element or its people
This social engineering tactic involves manipulating someone into revealing confidential information, often by exploiting human trust.
social engineering
What you should do immediately if you believe you have fallen victim to identity theft?
to report it to the proper authorities or take immediate steps to secure your accounts
This is the most effective way to prevent software vulnerabilities from being exploited.
applying security patches and updates?
This type of threat comes from a current or former employee who has knowledge of the organization's systems.
an insider threat
True or false: The CIA Triad is a security model used for evaluating the security of a system or network
True
Unlike a virus, this type of malware can self-replicate and spread to other computers on a network without user interaction.
a worm
Disabling this action in your browser can help prevent a type of web-based attack called cross-site request forgery.
the "remember me" or "keep me logged in" function
A security measure that creates a protective barrier between your computer network and outside networks.
is a firewall
This type of hacker is motivated by political or ideological beliefs, often seeking to spread disinformation.
a hacktivist