Understanding Cybersecurity
Online Safety
Common Threats
Best Practices
Role of Encryption in Cybersecurity
100

The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. 

What is Cybersecurity?

100

Helps you generate, store and manage strong, unique passwords securely. 

What is a password manager?

100

Encryption supports this by verifying the identity of users and devices. 

What is authentication? 

200

The ability to understand and recognize threats that exist on the internet, as well as having the skills and knowledge to avoid these threats.

What is online safety?

200

Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems. 

What are cybersecurity threats?

200

Regularly updating your operating systems, software, and applications to patch vulnerabilities. 

What is keeping software updated?

300
The practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.

What is network security?

300

Being careful about sharing information such as: full name, address, social security number

What is securing personal information?


300

The process of converting data into a more unreadable format, using a secret key, making it secure and accessible only to authorized parties with the corresponding decryption key. 

What is encryption?

400

Not clicking links or opening attachments in emails from people you do not know and avoiding the download of software or files from unknown sources. 

What is protecting against malware?

400

A malicious actor gaining access to an unsuspecting user's data, including sensitive information such as passwords and payment details. 

What is spyware?

400

A security measure that requires users to provide two or more verification factors beyond just a password to access a system or application, significantly enhancing security. 

What is Multi-Factor Authentication (MFA)?

400

The secure version of HTTP, ensuring encrypted communication between a user's browser and a website, protecting sensitive data from eavesdropping and tampering.

What is Hypertext Transfer Protocol Secure (HTTPS)?


 

500

How an organization responds to a cyber-security incident or any other event that causes the loss of operations or data.

What is Disaster recovery and business continuity?

500

Intercepting the communication between two endpoints, such as a user and an application.

What is a Man in the Middle (MitM) attack?

M
e
n
u