Who is considered one of the first computer programmers and contributed significantly to the field, working on Charles Babbage's Analytical Engine?
Who is Ada Lovelace?
Define "encryption" and its role in safeguarding sensitive information.
Encryption is the process of encoding data in a way that only authorized parties can access it. It ensures data confidentiality by making information unreadable to unauthorized users.
This professional in cybersecurity is responsible for identifying and fixing vulnerabilities before they can be exploited.
Who is an Ethical Hacker or Penetration Tester?
What is a DDoS attack, and how does it disrupt online services?
A Distributed Denial of Service attack floods a network or server with excessive traffic, rendering it inaccessible to legitimate users.
What is the purpose of a firewall in network security, and how does it function?
A firewall acts as a barrier between a trusted internal network and untrusted external networks, controlling incoming and outgoing traffic based on predetermined security rules.
This woman, known for her expertise in cryptography, played a pivotal role in breaking the German Enigma code during World War II. Who is she?
Who is Joan Clarke?
What are the three basic principles of cybersecurity commonly referred to as the CIA triad?
Confidentiality, Integrity, and Availability.
This role is responsible for continuously monitoring and analyzing an organization's security posture?
What is Security Operations or Security Analyst?
What is ransomware, and how does it operate to extort victims?
Ransomware is malicious software that encrypts files or systems, demanding payment for decryption keys, effectively holding data hostage.
Differentiate between intrusion detection systems (IDS) and intrusion prevention systems (IPS) in safeguarding networks.
IDS monitors network traffic and alerts for suspicious activity, while IPS not only detects but also takes automated action to block or prevent identified threats.
Who is the founder of the non-profit organization WiCyS?
Hope Brashear
What is the significance of creating strong, unique passwords, and how can individuals manage multiple complex passwords effectively?
Strong, unique passwords make it harder for attackers to crack accounts. Password managers help manage and generate complex passwords for various accounts securely.
This role involves developing security policies, procedures, and implementing security measures within an organization.
Who is a Security Architect or Security Engineer?
Define a zero-day vulnerability and explain why it poses a significant threat to cybersecurity.
A zero-day vulnerability is a flaw unknown to the software developer or vendor, making it exploitable by attackers before a patch is available.
Describe the concept of VLANs (Virtual Local Area Networks) and their role in network segmentation.
VLANs logically segment a single physical network into multiple isolated virtual networks, enhancing security by controlling traffic flow.
Who is the first woman to hold the position of Chief Information Security Officer (CISO) of the United States Department of Defense?
Melba Murray
Explain the importance of regular data backups in cybersecurity.
Regular data backups help mitigate data loss in case of cyber incidents like ransomware attacks or system failures, ensuring business continuity and data recovery.
Which job title typically involves investigating and responding to security incidents and breaches within an organization?
Who is an Incident Responder or Cybersecurity Analyst?
Name and describe one social engineering technique used by cybercriminals to manipulate individuals.
Phishing involves using deceptive emails or messages to trick recipients into revealing sensitive information or clicking on malicious links.
What is a Man-in-the-Middle (MitM) attack, and how can it be mitigated in a network environment?
A MitM attack intercepts communication between two parties. It can be mitigated by using encryption, digital certificates, and secure communication protocols like HTTPS.
Who was the first woman to hold the position of National Security Agency (NSA) Director?
General Claudia J. Kennedy, in 2010
Name and describe two-factor authentication (2FA) and its significance in securing accounts.
Two-factor authentication requires users to provide two different authentication factors (e.g., password and SMS code) to access an account, significantly enhancing security compared to just using a password.
This profession involves assessing and managing risks related to information security within an organization.
Who is a Risk Analyst (GRC) or Information Security Manager?
Differentiate between a virus, a worm, and a Trojan horse in the context of cyber threats.
A virus attaches itself to files or programs, a worm spreads independently, and a Trojan horse disguises itself as legitimate software to gain access.
Explain the significance of regular security audits and penetration testing in maintaining network security.
Security audits and penetration testing help identify vulnerabilities and weaknesses in networks, allowing for proactive measures to enhance security posture.