This term refers to deceptive emails designed to trick recipients into revealing personal information or clicking malicious links.
What is phishing?
This type of character, like # or @, is important to include in a strong password to increase security.
What is a special character?
This basic step involves regularly updating your software and apps to protect against security vulnerabilities.
What is software updates?
This type of software can help protect against phishing attacks by blocking malicious websites.
What is antivirus software?
This term refers to a type of software designed to gain unauthorized access to a computer system.
What is malware?
This is a common sign of a phishing email, often containing spelling and grammatical errors.
What are typos?
A password that includes your name or birthdate is considered this, making it easy for hackers to guess.
What is weak Password?
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Who are hackers?
This security measure adds an extra layer of protection by requiring two forms of identification.
What is two-factor authentication?
This term describes a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge.
What is a botnet?
A button that is found in external emails to notify Cybersecurity.
What is a Report Suspicious Button?
This is the minimum recommended length for a strong password.
What is 12 characters?
A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. They can have helpers or add-on functions incorporated by using interpreters to read the additional instructions and provide different web content types. Internet Explorer, Firefox and Safari are examples of these.
What is a browser? (or web browser)
This is a good habit to develop, involving regular updates to your passwords.
What is changing passwords regularly?
This is a type of attack where the attacker sends multiple requests to a server, overwhelming it and causing it to crash.
What is a Distributed Denial of Service (DDoS) attack?
This type of phishing uses text messages to lure victims, often referred to as "smishing."
What is SMS phishing?
This type of attack uses automated tools to systematically guess a password until the correct one is found.
What is a brute-force attack?
The lock icon in the top left of the browser
what is HTTPS?
This regulation, implemented in the European Union, aims to protect individuals’ personal data and privacy.
What is the General Data Protection Regulation (GDPR)?
This term refers to the practice of protecting systems, networks, and programs from digital attacks.
What is cybersecurity?
This is a common tactic used in phishing scams where attackers pretend to be a trusted source, like a bank or service provider.
What is impersonation?
Using long passwords or passphrases, combination of uppercase and lowercase letters, numbers and special characters are considered what?
What are best practices for Creating Strong Passwords?
This network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What is a Firewall?
This type of data is accessable by everyone
What is public data?
This advanced persistent threat involves a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period
What is an APT (Advanced Persistent Threat)?