Basic Concepts
Types of Attacks
Threat Agents
100

What is the process of converting data into a code to prevent unauthorized access?

Encryption

100

What is the name of an attack where an attacker sends fake emails to steal personal information?

Phishing

100

Those who have the intent to steal money and data.

Cybercriminals

200

What term describes the practice of verifying the identity of a user or system?

Authentication

200

What type of attack involves overwhelming a system with traffic to make it unavailable?

Denial-of-Service (DoS) attack

200

Internal employees or those who have access to data.

Insiders

300

What security system monitors and controls incoming and outgoing network traffic?

Firewall

300

What attack involves an attacker secretly relaying and possibly altering communication between two parties?

Man-in-the-Middle (MITM) attack

300

In order to gather intelligence, this cohort may steal data.

Nation States or Corporations

400

Name a software that detects and removes malicious software from a computer.

Antivirus software

400

Name a type of malware that encrypts data and demands a ransom for its release.

Ransomware

400

Hacking the system to threat or in some instance whistle-blowers to highlight an issue.

Hackers

500

What is the term for a flaw, bug, or misconfiguration in a system that can be exploited?

Vulnerability

500

What term describes the manipulation of someone into giving up personal information?

Social engineering 

500

Kids who are interested in learning how to hack, trial things out.

Script Kiddies

M
e
n
u