This is the process of converting information into a secure format, making it unreadable to unauthorized users.
What is encryption
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently they only make up 17% of computer intrusions.
Who are hackers ?
This software is designed to detect and remove malicious programs form your computer.
What is antivirus ?
This is recommended length for a secure password.
What is at least 12-16 characters ?
In 2017, this ramson attack affected hundreds of thousands of computers worldwide, exploiting a vulnerability in Microsoft Windows
What is WannaCry ?
This is deceptive attempt to acquire sensitive information by pretending to be a trustworthy entity, often via email.
What is phishing ?
A Vulnerability in hardware of software that attackers exploit before the vendor has released a patch is referred to as this.
What is zero-day exploit ?
An identifier that uniquely tracks actions to individuals.
What is an account ?
(or Login ID )
This phrase refers to the practice of using two or more verification methods to log in to a system.
What is multi-factor authentication (MFA) ?
In 2013, this major retail chain experienced a data breach that compromised the credit card information of over 40 million customers.
What is Target ?
This is the practice of testing a system or network for weakness that could be exploited by attackers.
What is penetration testing ?
The use of personality, knowledge of human nature and social skills to steal passwords. keys tokens or other credentials to gain access to systems.
What is social engineering ?
A secure network protocol that encrypts data between a web browser and a server, indicated by "https" in the URL.
What is SSL/TLS ?
A regular process of installing updates to fix security vulnerabilities is commonly called this.
What is patch management ?
This social media platform suffered a massive data breach in 2018, exposing the personal information of 50 million users ?
What is Facebook ?
This type of malware locks users out of their systems or data and demands payment to restore access.
What is ransomware ?
30-50% of all data loss due to the people already within the organization
What is insider threat ?
This tool monitors and filters incoming and outgoing network traffic based on predetermined security rules.
What is firewall ?
They are structured groups funded by other governments and dedicated to mapping out the intermit addresses for the purpose of espionage and possible computer attacks.
What is state sponsored hacking ?
In 2014, this entertainment company was hacked, allegedly by North Korea, over the release of the movie" The Interview "
What is Sony Pictures ?
A legal notification directing you or the bureau/office to preserve any documentary material that may berelevant to a pending or foreseeable lawsuit or administrative adjudication
What is Litigation Hold ?
A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weakness.
What is standardization ?
A tool used to evaluate the security of a network by simulating an attack.
What is vulnerability scanner ?
This is the recommended action to take if you receive an unexpected email attachment or link form an unknown sender
What is do not open or click it, and report it to DT ?
In 2021, this cyberattack targeted a major U.S. pipeline operator, disrupting fuel supplies across the East Coast.
What is the Colonial Pipeline attack ?