This is the practice of protecting systems, networks, and programs from digital attacks.
(What is cybersecurity?)
Malicious software that disguises itself as a legitimate program.
(What is a Trojan Horse?)
Hackers who work with permission to find vulnerabilities.
(What is a White Hat Hacker?)
In 2017, this ransomware attack affected 150 countries and shut down hospitals in the UK.
(What is WannaCry?)
Software designed to detect and remove malicious programs.
What is Antivirus Software?)
The CIA Triad stands for Confidentiality, Integrity, and this.
(What is Availability?)
This type of malware encrypts files and demands payment.
(What is Ransomware?)
Hackers who break into systems for malicious intent or personal gain.
(What is a Black Hat Hacker?)
Tricking someone into giving personal information through fake websites or emails.
(What is Phishing?)
A tool that hides your IP address and encrypts your internet connection.
What is a VPN?
This type of security focuses on ensuring applications are secure during development.
(What is Application Security?)
A self-replicating malware that spreads across networks without user interaction.
(What is a Worm?)
Hackers who sometimes act legally and sometimes illegally, depending on the situation.
(What is a Gray Hat Hacker?)
An attack where communication between two people is secretly intercepted.
(What is a Man-in-the-Middle attack?)
This extra layer of security requires two forms of verification.
What is Two-Factor Authentication?
he unique number assigned to each device on a network.
(What is an IP address?)
This type of cyber attack floods a network with excessive traffic.
(What is a DDoS attack?)
Hackers motivated by political or social activism.
(What is a Hacktivist?)
This attack inserts malicious code into website input fields.
(What is SQL Injection?)
A security device or software that blocks unauthorized access to a network.
(What is a Firewall?)
This protocol is used to translate domain names into IP addresses.
(What is DNS?)
A group of infected computers controlled remotely as a single entity.
(What is a Botnet?)
Hackers backed by governments to target other nations.
(What is a State-Sponsored Hacker?)
This type of cybercrime involves stealing credit card information for fraudulent purchases.
(What is Carding?)
A cybersecurity tool used to analyze and capture network traffic.
(What is Wireshark?)