Basics
Cybersecurity terms
Cybersecurity practices
Cybersecurity tools and technologies
Advanced Cybersecurity Concepts
100

What software detects and prevents malicious malware on your devices

What is An Antivirus software

100

This word refers to the use of deception to trick people into revealing confidential information

What is Social Engineering?

100

Enabling this on accounts adds an extra layer of security by requiring a code in addition to a password.

What is Two factor authentication?
100

This technology is used to create a secure and encrypted connection over a less secure network, such as the internet.

What is a VPN?

100

This algorithm is used to convert readable data into unreadable code to protect it during transmission.

What is encryption

200

Attempt to get sensitive information by disguising yourself as a trustworthy entity in electronic communication 

What is Phishing

200

A security system that monitors and controls incoming and outgoing network traffic

What is a firewall?
200

This practice involves regularly creating copies of data to protect against loss or corruption.

What is backing up data?
200

This software is designed to protect your device from malware by monitoring and analyzing system behavior in real time.

What is anti-malware software?

200

The term for a unique identifier assigned to a device on a network.

What is an IP address

300

The practice of securing a computer network to protect data from cyber threats is known as

What is Network Security 

300

The practice of protecting internet-connected systems from cyberattacks 

What is cybersecurity 

300

The process of identifying and fixing security vulnerabilities in software is known as this

What is patching?

300

This tool is commonly used to scan a network for open ports and identify vulnerabilities.

What is a port scanner?

300

A program that looks for suspicious activity and may block potential security breaches in real-time.

What is an Intrusion detection system (IDS)

400

A common security measure that uses at least eight characters, mixing letters, numbers, and symbols for better protection

What is a strong Password

400

This type of attack overloads a network or server with traffic, making it unavailable to users.

What is DDoS (Distributed Denial-of-Service) attack ?

400

This policy limits users' access rights to only what is necessary for their roles

What is the principle of least privilege

400

This tool helps manage and generate complex passwords securely for different accounts.

What is a password manager?

400

This type of cybersecurity testing simulates a real-world cyber attack to find vulnerabilities.

What is penetration testing?

500

A type of malware that encrypts the victim's files, demanding payment for decryption

What is Ransomware?
500

This type of malware grants unauthorized access to a victim's computer by exploiting vulnerabilities. (Hint USC mascot)

What is a Trojan Horse 

500

This is the process of analyzing and identifying potential security threats in a system.

What is Threat assessment

500

This type of system not only detects threats in real-time but can also respond automatically to stop or mitigate an attack.

What is an intrusion prevention system (IPS)

500

This is the term for a state-sponsored or government-affiliated group that conducts cyber espionage or warfare.

What is an advanced persistent threat (APT)?

M
e
n
u