Confidentiality, Integrity, Availability
What does "CIA" stand for in cybersecurity?
A type of attack where a malicious actor tries to trick someone into revealing sensitive information by pretending to be a trusted entity.
What is phishing?
Internet Protocol
What does IP stand for in "IP address"?
In 2013, this major retailer experienced a breach that exposed 40 million credit and debit card numbers
What is Target?
The practice of using a second method of authentication, in addition to a password, to protect an account
What is Two-factor authentication (2FA)?
To protect information by converting it into a coded format that can only be read by someone with the decryption key
What is encryption?
Type of attack involves overwhelming a network or server with traffic to make it unavailable to users?
What is Distributed Denial-of-Service (DDoS) attack?
A device that forwards data between computer networks, ensuring data gets to its destination?
What is a router
In 2017, this credit reporting agency suffered a data breach that exposed the personal information of 147 million people
What is Equifax?
Software that scans your device for viruses and other malicious software
What is Antivirus software?
Monitors and controls incoming and outgoing network traffic based on predetermined security rules to prevent unauthorized access
What is a firewall?
A type of malware that encrypts a victim's data, holding it hostage until a ransom is paid to unlock it
What is ransomware?
Name of the protocol used to securely transfer files over the internet, often used instead of FTP
What is SFTP (Secure File Transfer Protocol) ?
Targeted in the 2014 cyberattack linked to North Korea after the release of a controversial movie
Sony Pictures
A security practice where users and systems are given the minimum level of access needed to perform their tasks, reducing the risk of misuse or breaches
What is the principle of least privilege?
Requires two or more methods of verification for access, while two-factor authentication (2FA) specifically uses exactly two methods
What is multi-factor authentication (MFA), and how does it differ from two-factor authentication (2FA)?
Software security flaw that is unknown to the software vendor and has no patch available, making it vulnerable to exploitation
What is a zero-day vulnerability?
A 32-bit number that divides an IP address into network and host portions, helping to define the range of IP addresses within a network
What is a subnet mask?
2016 cyberattack targeted the Democratic National Committee (DNC) and had significant political consequences
Which 2016 cyberattack targeted the Democratic National Committee (DNC) and had significant political consequences?
Involves regularly updating software and systems with security patches to fix vulnerabilities and protect against cyber threats
What is patch management?
Uses the same key for both encryption and decryption, while _____ encryption uses a pair of keys—a public key for encryption and a private key for decryption.
What is the difference between symmetric and asymmetric encryption?
Prolonged and targeted cyberattack where a malicious actor gains unauthorized access to a network and remains undetected for an extended period to steal data or cause disruption.
What is an Advanced Persistent Threat (APT)?
It is a protocol used to encrypt the communication between a web server and a browser, ensuring secure data transmission
What is SSL?
2014 breach affected 500 million user accounts and led to the sale of the affected company to Verizon in 2017
What is the The Yahoo data breach ?
A documented strategy used by an organization to detect, respond to, and recover from cybersecurity incidents in order to minimize damage and restore normal operations as quickly as possible
What is a security incident response plan?