The three goals of cybersecurity remembered by the acronym CIA.
What are Confidentiality, Integrity, and Availability?
The general name for bad software that harms devices or steals info
What is Malware?
Rules computers use to talk over the internet (examples: HTTP, SMTP, TCP/IP).
What are Protocols?
Use this to make it more difficult for unauthorized users to gain access to your accounts by requiring a password and an additional verification method
What is Multi-Factor Authentication (MFA) or Two-Factor Authentication (2FA)?
On average, how quickly can an unprotected networked computer be compromised once connected to the internet?
What is 20 minutes?
The CIA goal that ensures information isn't changed without permission.
What is Integrity?
The general name for fake emails used to trick people into sharing personal information
What is Phishing?
Secure protocol used for encrypted web traffic — look for "https://" and a padlock.
What is TLS/SSL (HTTPS)?
Use this specifically when using public Wi-Fi to create a private connection?
What is a Virtual Private Network (VPN)?
According to the BJS, what percent of people reported someone stole personally-identifiable information?
What is 22%
A student stores their research paper in a shared cloud folder but accidentally leaves the folder set to “Anyone with the link can view.” This is an example of which CIA Triad element?
What is Confidentiality?
Malware that spreads by itself across networks without needing a host file.
What is a Worm?
Device that forwards packets across networks.
What is a Router?
Another word for a "fix" or "solution" for a security issue
Hint: bandage
What is a Patch?
The National Security Alliance 2004 estimate for percent of home PCs infected with spyware
What is 80%?
On the day of an online test, the school’s learning platform goes down because the server is overloaded. Students can’t access the test when scheduled. This is an example of which CIA element?
What is Availability?
The name of the attack that involves registering a URL based on a legitimate website but with a small typo
What is Typosquatting?
Local network that connects devices in a small area like a home or school.
What is a LAN (Local Area Network)?
A barrier that blocks unauthorized access to and from a network or system
What is a Firewall?
The algorithm used to check numbers like many credit card numbers
What is the Luhn algorithm/formula?
Checksums and the Luhn formula are part of this CIA element.
What is Integrity?
The difference between a Trojan horse and a honeypot
What is Trojan horses fight innocent/good people, while honeypots trap bad actors/malicious hackers?
The most recommended wi-fi security today
Wi-Fi-Protected Access (WPA) Versions 2 and 3
aka WPA2 and WPA3
Name any hint that a message might be social engineering.
What are
-random offers
-poor writing
-unknown sender/portraying as someone else
-threatening content
-strange sense of urgency
-(Any others)
The name of the update that added many security features to Windows XP Pro in the early 2000s
What is Service Pack 2 (SP2)?