Access Control
Security Threats
Internet Security
Security Tools
Email Security
100

A method where access to a website or account is only granted after the user presents two or more factors (password, SMS code, etc.)

What is multifactor authentication? (or two-factor authentication)

100

A type of malicious software, or malware designed to deny access to a computer system or data until compensation is paid

What is ransomware?

100

The record your browser keeps of the websites you’ve visited

What is browser history?

100

A secret word or phrase that must be used to gain access to a computer system or service

What is a password?

100

An unsolicited message sent via bulk email, also known as junk emails

What is spam?

200

An approach to restrict system access to authorized users by granting it based on business responsibilities

What is role-based access control (RBAC)?

200

An attack that aims to make a service such as a website unusable by flooding it with a large amount of malicious traffic

What is a (distributed) denial of service attack (DDoS)?

200

The use of remote servers hosted on the internet to store, manage, and process data, rather than a local server or personal computer

What is cloud computing?

200

A tool used commonly to detect and remove malware from a computer

What is an anti-virus?

200

Sending malicious or fraudulent emails pretending to be from someone else in order to gain access to data, such as personal information and passwords

What is phishing?

300

A user authentication service that allows users to log into many different applications with a single set of credentials

What is Single Sign On (SSO)?

300

An attack that repeatedly tries possible passwords or encryption keys until the correct one is found

What is a brute-force attack?

300

The global, hypermedia-based collection of information and services that is available on internet servers

What is the World Wide Web?

300

An appliance used at the edge of a network to block unauthorized access and control traffic

What is a firewall?

300

A targeted attempt to steal sensitive information specifically targeting high-profile personnel or senior management

What is whaling or spear-phishing?

400

The use of physical characteristics such as fingerprints to authenticate users

What is biometric authentication?

400

A cyber threat that comes from within an organization - for example, from an employee

What is an insider threat?

400

A segment of data sent by an Internet server to the browser which is stored by the browser to track a user

What is a cookie?

400

The process of converting plaintext into another format that cannot be decoded without a key.

What is encryption?

400

A technique used to fake the sender address of an email

What is spoofing?

500

The principle of allowing users as little access to a system as possible for them to complete their tasks

What is the principle of least privilege?

500

A confirmed incident in which sensitive or confidential data has been accessed or released without authorization

What is a data breach?

500

This system or application hides a user's network origin while they are browsing online

What is a VPN?

500

A set of changes deployed to a computer program designed to update, fix, or improve it

What is a patch?

500

A key that uniquely identifies the sender of the message and proves the message hasn’t been altered in transit

What is a digital signature?

M
e
n
u