Women in Cybersecurity
Cybersecurity
Fundamentals
Careers in Cybersecurity
Cyber
Threats
Network Security
100

Who is considered one of the first computer programmers and contributed significantly to the field, working on Charles Babbage's Analytical Engine?

Who is Ada Lovelace?

100

Define "encryption" and its role in safeguarding sensitive information.

Encryption is the process of encoding data in a way that only authorized parties can access it. It ensures data confidentiality by making information unreadable to unauthorized users.

100

This professional in cybersecurity is responsible for identifying and fixing vulnerabilities before they can be exploited.

Who is an Ethical Hacker or Penetration Tester?

100

What is a DDoS attack, and how does it disrupt online services?

A Distributed Denial of Service attack floods a network or server with excessive traffic, rendering it inaccessible to legitimate users.

100

What is the purpose of a firewall in network security, and how does it function?

A firewall acts as a barrier between a trusted internal network and untrusted external networks, controlling incoming and outgoing traffic based on predetermined security rules.

200

This woman, known for her expertise in cryptography, played a pivotal role in breaking the German Enigma code during World War II. Who is she?

Who is Joan Clarke?

200

What are the three basic principles of cybersecurity commonly referred to as the CIA triad?

Confidentiality, Integrity, and Availability.

200

This role is responsible for continuously monitoring and analyzing an organization's security posture?

What is Security Operations or Security Analyst?

200

What is ransomware, and how does it operate to extort victims?

Ransomware is malicious software that encrypts files or systems, demanding payment for decryption keys, effectively holding data hostage.

200

Differentiate between intrusion detection systems (IDS) and intrusion prevention systems (IPS) in safeguarding networks.

IDS monitors network traffic and alerts for suspicious activity, while IPS not only detects but also takes automated action to block or prevent identified threats.

300

Who is the founder of the non-profit organization WiCyS?

Hope Brashear

300

What is the significance of creating strong, unique passwords, and how can individuals manage multiple complex passwords effectively?

Strong, unique passwords make it harder for attackers to crack accounts. Password managers help manage and generate complex passwords for various accounts securely.

300

This role involves developing security policies, procedures, and implementing security measures within an organization.

Who is a Security Architect or Security Engineer?

300

Define a zero-day vulnerability and explain why it poses a significant threat to cybersecurity.

A zero-day vulnerability is a flaw unknown to the software developer or vendor, making it exploitable by attackers before a patch is available.

300

Describe the concept of VLANs (Virtual Local Area Networks) and their role in network segmentation.

VLANs logically segment a single physical network into multiple isolated virtual networks, enhancing security by controlling traffic flow.

400

Who is the first woman to hold the position of Chief Information Security Officer (CISO) of the United States Department of Defense?

Melba Murray

400

Explain the importance of regular data backups in cybersecurity.

Regular data backups help mitigate data loss in case of cyber incidents like ransomware attacks or system failures, ensuring business continuity and data recovery.

400

Which job title typically involves investigating and responding to security incidents and breaches within an organization?

Who is an Incident Responder or Cybersecurity Analyst?

400

Name and describe one social engineering technique used by cybercriminals to manipulate individuals.

Phishing involves using deceptive emails or messages to trick recipients into revealing sensitive information or clicking on malicious links.

400

What is a Man-in-the-Middle (MitM) attack, and how can it be mitigated in a network environment?

A MitM attack intercepts communication between two parties. It can be mitigated by using encryption, digital certificates, and secure communication protocols like HTTPS.

500

Who was the first woman to hold the position of National Security Agency (NSA) Director?

General Claudia J. Kennedy, in 2010

500

Name and describe two-factor authentication (2FA) and its significance in securing accounts.

Two-factor authentication requires users to provide two different authentication factors (e.g., password and SMS code) to access an account, significantly enhancing security compared to just using a password.

500

This profession involves assessing and managing risks related to information security within an organization.  

Who is a Risk Analyst (GRC) or Information Security Manager?

500

Differentiate between a virus, a worm, and a Trojan horse in the context of cyber threats.

A virus attaches itself to files or programs, a worm spreads independently, and a Trojan horse disguises itself as legitimate software to gain access.

500

Explain the significance of regular security audits and penetration testing in maintaining network security.

Security audits and penetration testing help identify vulnerabilities and weaknesses in networks, allowing for proactive measures to enhance security posture.

M
e
n
u