Ciphers
Password Security
Cyber Threats
Types of Malware
Other
100

A method of encrypting alphabetic text using symbols in a grid.

Pig Pen Cipher

100

These criteria, such as length, character types, and restrictions, are often enforced to enhance password strength.  

Password Complexity Requirements

100

This method tries every possible combination of characters to crack passwords or encryption keys.

Brute Force Attack

100

This type of malware encrypts a victim's files and demands payment for their decryption.

Ransomware

100

This term refers to a weakness in a system or software that could be exploited by attackers.

Vulnerability

200

A method of encoding text characters as sequences of dots and dashes.

Morse Code

200

These cryptographic functions convert input data into a fixed-size string of characters, used extensively to store passwords securely.

Hashing Algorithms

200

This method uses a list of common words or phrases to attempt to crack passwords.

Dictionary Attack

200

Malware that disguises itself as legitimate software to trick users into installing it, allowing attackers to gain unauthorized access or steal information.

Trojan Horse

200

This network security system monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Firewall

300

A cipher where each letter of the plaintext is shifted according to a person's birthdate.

Birthday Cipher

300

A random value added to passwords before hashing to ensure that even identical passwords have unique hash values.

Password Salt

300

These precomputed tables contain hashed passwords to facilitate rapid password cracking.  

Rainbow Tables

300

Malware that secretly monitors and gathers information about a user's activities without their knowledge, often for advertising or espionage purposes.

Spyware

300

This process converts plaintext into ciphertext to secure sensitive data during storage or transmission.

Encryption

400

A cipher technique where each letter in the plaintext is shifted a certain number of places down or up the alphabet.

Caesar Shift Cipher

400

This software securely stores and manages passwords, often with features like encryption and automatic form filling.

Password Manager

400

This tactic manipulates individuals into divulging confidential information or performing actions they shouldn't.

Social Engineering

400

This attack takes advantage of a vulnerability that is unknown to the software developer and for which no patch is available.

Zero-Day Exploit

400

This process involves regularly updating software and systems with patches to fix security vulnerabilities and improve functionality.

Patch Management

500

A symmetric encryption algorithm used to secure sensitive data.

AES (Advanced Encryption Standard)

500

This security method requires users to provide two or more verification factors to gain access to a system.

Multi-Factor Authentication (MFA)

500

This fraudulent technique attempts to trick individuals into revealing sensitive information by posing as a trustworthy entity.

Phishing

500

Malware that records keystrokes on a computer, allowing attackers to capture sensitive information such as passwords and credit card numbers.

Keylogger

500

This process involves detecting, responding to, and mitigating security incidents such as breaches or cyber attacks.

Incident Response

M
e
n
u