Hardware
Computer Jargon
Weakness
Risk
Security
100

n electronic device for storing and processing data according to instructions given to it in a software program.

What is a computer?

100

refers to programs and applications that run on a computer.

What us software?

100

data that could be used to identify a particular person. It includes items such as name, address, social security number, birthdate, telephone number, email address, text messages, and geographic location information.

What is PII Personally Identifiable Information 

100

The art and science of using mathematics to secure information and create a high degree of trust in the electronic realm

What is cryptography?

100

A device or program that controls the flow of network traffic by enforcing security policies that allow or deny traffic to pass through the network

What is a firewall?

200

refers to the physical parts of a computer and related devices, such as chips, circuits, wires, monitor, keyboard, mouse, printer, scanner, hard drive, and RAM.

What is hardware?

200

a set of instructions forming a computer program that is executed by a computer.

What is program code?

200

anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.

What is a threat?

200

The use of computer networks to gain illicit access to confidential information of a government or organization

What is cyber espionage?

200

Works to identify, communicate, and understand threats and mitigations within the context of protecting something of value

What is threat modeling?

300

a set of electronic circuitries and is the main processor that runs the operating system and the applications.

What is CPU?

300

a series of digits with the two symbols 1 and 0 that represent anything digitally.

What is binary code?

300

Gathering sensitive information by physically looking over a shoulder

What is shoulder surfing?

300

The process of identifying security risks, determining their magnitude, and identifying areas needing safeguards

What is risk management?

300
VPN

What is Virtual Private Network

400

is the computer’s permanent memory where all files, programs, and the operating system are stored.

What is storage?

400

system software that coordinates the operation of hardware and software.

What is operating system?

400

hysical breach into a restricted area, also known as piggybacking

What is tailgating?

400

A technique in which an adversary compromises a system by convincing a human to violate the security policies in a way that enables the adversary to gain an advantage

What is social engineering?

400

What a hacker is looking for when they pin test

What is a vulnerabvility

500

the computer’s temporary quick-access memory where programs and data are loaded and accessed during processing.

What is RAM?

500

A global domain within the information environment consisting of the interdependent network of information systems infrastructures including the internet, telecommunications networks, computer systems, and embedded processors and controllers

What is Cyberspace?

500

Creating a false narrative using some true facts in order to build trust and credibility

What is pretexting?

500

A special operating system designed specifically for cybersecurity professionals, penetration testers, and people who want to learn about computer security

What is Kali Linux?

500

The famous person who had their phone hacked in the case study we examined last year.

Who is Jeff Bezos

M
e
n
u