Cybersecurity Basics
Cyber Threats
Cyber Tools
Cyber Best Practices
Famous Cyber Incidents
100

This is the process of converting information into a secure format, making it unreadable to unauthorized users.

What is encryption? 

100

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.

Who are hackers?

100

This software is designed to detect and remove malicious programs from your computer.

What is antivirus software?

100

This is the recommended length for a secure password.

What is at least 12-16 characters?

100

In 2017, this ransomware attack affected hundreds of thousands of computers worldwide, exploiting a vulnerability in Microsoft Windows.

What is WannaCry?

200

This is a deceptive attempt to acquire sensitive information by pretending to be a trustworthy entity, often via email.  

What is phishing? 

200

A vulnerability in hardware or software that attackers exploit before the vendor has released a patch is referred to as this.

What is a zero-day exploit? 

200
An identifier that uniquely tracks actions to individuals.
What is an Account? (or Login ID)
200

This phrase refers to the practice of using two or more verification methods to log in to a system.

What is multi-factor authentication (MFA)?

200

In 2013, this major retail chain experienced a data breach that compromised the credit card information of over 40 million customers.

What is Target?

300

This is the practice of testing a system or network for weaknesses that could be exploited by attackers.

What is penetration testing?

300
The use of personality, inowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
What is Social Engineering?
300

A secure network protocol that encrypts data between a web browser and a server, indicated by "https" in the URL.

What is SSL/TLS? 

300

A regular process of installing updates to fix security vulnerabilities is commonly called this.

What is patch management?

300

This social media platform suffered a massive data breach in 2018, exposing the personal information of 50 million users.

What is Facebook? 

400

This type of malware locks users out of their systems or data and demands payment to restore access.

What is ransomware?

400
30-50% of all data loss due to the people already within the organization.
What is Insider Threat?
400

This tool monitors and filters incoming and outgoing network traffic based on predetermined security rules.

What is a firewall?

400
They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.
What is state sponsored hacking?
400

In 2014, this entertainment company was hacked, allegedly by North Korea, over the release of the movie "The Interview."

What is Sony Pictures?

500
A legal notification directing you or the bureau/office to preserve any documentary material that may berelevant to a pending or foreseable lawsuit or administrative adjudication.
What is Litigation Hold?
500
A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.
What is Standardization?
500

A tool used to evaluate the security of a network by simulating an attack.

What is a vulnerability scanner? 

500

This is the recommended action to take if you receive an unexpected email attachment or link from an unknown sender.

What is do not open or click it, and report it to DT?

500

In 2021, this cyberattack targeted a major U.S. pipeline operator, disrupting fuel supplies across the East Coast.

What is the Colonial Pipeline attack?

M
e
n
u