What software detects and prevents malicious malware on your devices
What is An Antivirus software
This word refers to the use of deception to trick people into revealing confidential information
What is Social Engineering?
Enabling this on accounts adds an extra layer of security by requiring a code in addition to a password.
This technology is used to create a secure and encrypted connection over a less secure network, such as the internet.
What is a VPN?
This algorithm is used to convert readable data into unreadable code to protect it during transmission.
What is encryption
Attempt to get sensitive information by disguising yourself as a trustworthy entity in electronic communication
What is Phishing
A security system that monitors and controls incoming and outgoing network traffic
This practice involves regularly creating copies of data to protect against loss or corruption.
This software is designed to protect your device from malware by monitoring and analyzing system behavior in real time.
What is anti-malware software?
The term for a unique identifier assigned to a device on a network.
What is an IP address
The practice of securing a computer network to protect data from cyber threats is known as
What is Network Security
The practice of protecting internet-connected systems from cyberattacks
What is cybersecurity
The process of identifying and fixing security vulnerabilities in software is known as this
What is patching?
This tool is commonly used to scan a network for open ports and identify vulnerabilities.
What is a port scanner?
A program that looks for suspicious activity and may block potential security breaches in real-time.
What is an Intrusion detection system (IDS)
A common security measure that uses at least eight characters, mixing letters, numbers, and symbols for better protection
What is a strong Password
This type of attack overloads a network or server with traffic, making it unavailable to users.
What is DDoS (Distributed Denial-of-Service) attack ?
This policy limits users' access rights to only what is necessary for their roles
What is the principle of least privilege
This tool helps manage and generate complex passwords securely for different accounts.
What is a password manager?
This type of cybersecurity testing simulates a real-world cyber attack to find vulnerabilities.
What is penetration testing?
A type of malware that encrypts the victim's files, demanding payment for decryption
This type of malware grants unauthorized access to a victim's computer by exploiting vulnerabilities. (Hint USC mascot)
What is a Trojan Horse
This is the process of analyzing and identifying potential security threats in a system.
What is Threat assessment
This type of system not only detects threats in real-time but can also respond automatically to stop or mitigate an attack.
What is an intrusion prevention system (IPS)
This is the term for a state-sponsored or government-affiliated group that conducts cyber espionage or warfare.
What is an advanced persistent threat (APT)?