What software detects and prevents malicious malware on your devices
What is An Antivirus software
This word refers to the use of deception to trick people into revealing confidential information
What is Social Engineering?
Enabling this on accounts adds an extra layer of security by requiring a code in addition to a password.
What a firewall does to prevent unauthorized access.
What is blocking or filtering traffic?
This algorithm is used to convert readable data into unreadable code to protect it during transmission.
What is encryption
Attempt to get sensitive information by disguising yourself as a trustworthy entity in electronic communication
What is Phishing
A security system that monitors and controls incoming and outgoing network traffic
What the 'S' stands for in 'HTTPS'
What is 'Secure'?
This software is designed to protect your device from malware by monitoring and analyzing system behavior in real time.
What is anti-malware software?
The term for a unique identifier assigned to a device on a network.
What is an IP address
The practice of securing a computer network to protect data from cyber threats is known as
What is Network Security
The practice of protecting internet-connected systems from cyberattacks
What is cybersecurity
The process of identifying and fixing security vulnerabilities in software is known as this
What is patching?
This security measure adds a second layer, like a text code, to prove your identity.
What is Two-Factor Authentication (2FA) or Multi-Factor Authentication (MFA)?
The day of the week when Microsoft releases security updates (patches).
What is Tuesday? (aka "Patch Tuesday", the second Tuesday of every month)
A common security measure that uses at least eight characters, mixing letters, numbers, and symbols for better protection
What is a strong Password
This type of attack overloads a network or server with traffic, making it unavailable to users.
What is DDoS (Distributed Denial-of-Service) attack ?
This policy limits users' access rights to only what is necessary for their roles
What is the principle of least privilege
This tool helps manage and generate complex passwords securely for different accounts.
What is a password manager?
This type of cybersecurity testing simulates a real-world cyber attack to find vulnerabilities.
What is penetration testing?
A type of malware that encrypts the victim's files, demanding payment for decryption
This type of malware grants unauthorized access to a victim's computer by exploiting vulnerabilities. (Hint USC mascot)
What is a Trojan Horse
This is the process of analyzing and identifying potential security threats in a system.
What is Threat assessment
The term for software that secretly records your keystrokes to steal passwords.
What is keylogging?
The name of the teacher's cat (hint: a Star Wars character).