You've Been Hacked
Vocabulary
The CIA Triad
Malware & Cybersecurity
Security & Firewalls
100

Cybersecurity is the practice of protecting your computer, network, and __________.

data

100

Protecting computers, networks, and data from attacks, damage, or unauthorized access.

Cybersecurity

100

What does the C in the CIA triad 

Confidentiality

100

An "umbrella" term for any malicious software designed to cause damage.

malware

100

A security process that requires two distinct forms of identification.

2 Factor Authentication (2FA) or Multifactor Authentication (MFA)

200

Hackers want _______, access, identity, and control.

wealth

200

Monitors and filters network traffic.

firewall

200

A retail website (like Amazon) staying online during Black Friday is an example of which pillar of the CIA Triad working properly.

Availability

200

Which type of malware does NOT self replicate?

Trojan 

200

Using unique physical characteristics, like a thumbprint, to verify identity.

biometrics

300

What is it called when hacking the human brain?

Social Engineering

300

Expert hired to find database weaknesses

ethical hacker

300

What are three parts of the CIA Triad

Confidentiality, Integrity, Availability

300

Which Malware needs a host file to spread?

Virus

300

A secure, encrypted location where a password manager stores your login information.

vault

400

What are fake emails or texts designed to lure you into clicking a link.

phishing

400

Computer files locked for $100 payment

Ransomware

400

An online banking system showing your correct balance is an example of which pillar of the CIA Triad working properly.

Integrity

400

Which malware does not require human help?

Worm

400

Everything on the internet is broken down into tiny pieces called _________.

packets

500

What is the "unlocked front door" of the internet?

weak passwords

500

Converting information into coded form so only authorized users can read it.

encryption

500

A hacker steals student Social Security numbers from the school database is an example of which pillar of the CIA Triad NOT working properly.

Confidentiality

500

Which malware uses social engineering to trick users into downloading it.

Trojan

500

A Network ____________ creates firewall rules.

Administrator

M
e
n
u