This term describes the practice of protecting systems, networks, and programs from digital attacks.
What is cybersecurity?
This type of attack involves an attacker sending fraudulent communications that appear to come from a reputable source.
What is phishing?
This security measure involves regularly updating software to fix vulnerabilities and improve functionality.
What is patch management?
This 1988 event is considered one of the first major internet worms, created by Robert Tappan Morris.
What is the Morris Worm?
This international organization develops standards and guidelines to help organizations manage cybersecurity risks.
What is the International Organization for Standardization (ISO)?
This type of software is designed to detect and remove malicious software from a computer.
What is antivirus software?
This type of malware encrypts a victim's files and demands payment to restore access.
What is ransomware?
This principle involves granting users only the access they need to perform their job functions.
What is the principle of least privilege?
This 2017 ransomware attack affected over 200,000 computers across 150 countries, exploiting a vulnerability in Windows.
What is WannaCry?
This non-profit organization is known for its widely used cybersecurity framework, including the Top 10 Web Application Security Risks.
What is the Open Web Application Security Project (OWASP)?
This is the process of converting information or data into a code to prevent unauthorized access.
What is encryption?
This term refers to a network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
What is a botnet?
This is a security measure that requires users to provide two forms of identification before accessing an account.
What is two-factor authentication?
This term refers to the unauthorized access and theft of data from a computer system, often for financial gain or espionage.
What is hacking?
This U.S. government agency is responsible for protecting federal networks and critical infrastructure from cyber threats.
What is the Cybersecurity and Infrastructure Security Agency (CISA)?
This term refers to the practice of ensuring that data is accurate and reliable.
What is data integrity?
This type of malware disguises itself as legitimate software to trick users into installing it.
What is a Trojan horse?
This type of test involves simulating cyberattacks on a system to identify vulnerabilities.
What is penetration testing?
This 2014 breach exposed the personal data of over 500 million users of a major internet company.
What is the Yahoo data breach?
This U.S. government agency provides intelligence on cyber threats and works to protect national security.
What is the National Security Agency (NSA)?
This type of attack involves overwhelming a system with traffic to make it unavailable to users.
What is a Distributed Denial of Service (DDoS) attack?
This term describes a vulnerability that is unknown to those who should be interested in mitigating it.
What is a zero-day exploit?
This term refers to the process of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability or impact of unfortunate events.
What is risk management?
This 2013 attack compromised the credit and debit card information of 40 million customers of a major retail chain.
What is the Target data breach?
This organization is responsible for coordinating the response to cyber incidents affecting the European Union.
What is the European Union Agency for Cybersecurity (ENISA)?