The most common type of password attack.
What is brute force attack?
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
What is a virus?
The tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information.
What is social engineering?
A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What is a firewall?
The meaning of "think before you click".
What is taking a moment to evaluate the potential risks before clicking on links or opening attachments in emails, messages, or websites?
The key elements of a strong password.
What is a mix of uppercase and lowercase letters, numbers, and special characters? Also, it should be long and unique.
A common type of malware that spreads without needing to attach itself to another program.
What is a worm?
A targeted phishing attack that focuses on specific individuals or organizations, using personalized information to increase the chances of success.
What is a spear phishing attack?
The purpose of a DDoS (Distributed Denial of Service) attack.
What is to overwhelm a target system or network with a massive volume of traffic, causing it to become unavailable to legitimate users?
The recommended practice for managing passwords.
What is use of unique passwords for each online account or password diversity?
This security measure requires users to provide two forms of identification before accessing an account.
What is two-factor authentication (2FA)?
This type of malware disguises itself as legitimate software and tricks users into installing it, usually by presenting an enticing offer or useful utility.
What is a trojan horse?
The common target information of phishing attacks.
What is login credentials, financial information, and sensitive personal data?
This security measure ensures that data transmitted between a user's web browser and a website is encrypted, providing a secure connection.
What is SSL/TLS (Secure Sockets Layer/Transport Layer Security)?
The importance of regularly updating software.
What is updates have new security patches that fix known vulnerabilities, reducing the risk of exploitation by cyber attackers?
The process of converting data into a code to prevent unauthorized access.
What is encryption?
A type of malware that encrypts a user's data and demands a ransom payment for the decryption key.
What is ransomware?
The common signs of a phishing attempt.
What is poor grammar and spelling, suspicious links or URLs, urgent requests for personal information, and generic greetings?
The role of antivirus software in cyber security.
What is detecting, preventing, and removing malware infections from devices, protecting them from various cyber threats?
The basic practices to protect online privacy.
What is using strong passwords, enabling two-factor authentication, being cautious about sharing personal information, and regularly updating privacy settings on social media accounts?
The reason why public Wi-Fi is risky for sensitive activities.
What is because public Wi-Fi networks are often unsecured, allowing hackers to intercept data transmitted over them? Using public Wi-Fi for sensitive activities can lead to data theft and privacy breaches.
This type of malware targets firmware.
What is a rootkit?
The practices to avoid social engineering attacks.
What is being cautious about sharing personal information, double-checking the sender's email address, and avoiding clicking on unfamiliar links? Also, educating oneself about common tactics.
The common network security protocols.
What is HTTPS (secure browsing), SSL/TLS (secure data transmission), and IPsec (secure communication between devices)?
The steps someone should take after receiving a suspicious email or link.
What is don't click on any links or download attachments, report the email as spam or phishing, and notify your organization's IT security team about the suspicious activity?