This is the process of converting information into a secure format, making it unreadable to unauthorized users
What is Encrpytion?
The broad term for people who try to gain access to computers beyond traditional means. Also sometimes called White Hat(s), or Black Hat(s)
Who are Hackers?
This software is designed to detect and remove malicious programs from your computer`
What is Antivirus Software?
This is the recommended number of characters in a secure password.
What is 12 to 16 characters?
In 2017, this ransomware attack infected hundreds of thousands of computers worldwide, exploiting a Vulnerability in Microsoft Windows.
What is WannaCry?
This is a deceptive attempt to acquire sensitive information by pretending to be a trustworthy entity, often via email.
What is Phishing?
A vulnerability in hardware or software that has not been previously identified by the vendor, and can be exploited by hackers.
What is a Zero-Day Exploit (or vulnerability)
A unique identifier that all employees have, and is a critical piece of intel needed by hackers, that is less secretive than a password.
What is an Account Name (Login ID)
This phrase to the practice of using two or more verification methods to log into a system.
What is Multi-Factor Authentication (MFA)?
In 2013, this major retail chain experienced a data breach that compromised the credit card information of over 40 million customers.
What is Target?
This is the practice of testing a system or network for weaknesses and vulnerabilities that could be exploited by an attacker.
What is Penetration Testing?
The use of personality, knowledge of human nature and social skills to steal passwords, keys, tokens or other credentials to gain access to systems.
What is Social Engineering?
A secure network protocol that encrypts data between a web browser and a server, indicated by "https" in the URL.
What is Secure Socket Layer (SSL) / Transport Layer Security (TSL)
What is Patching (Patch Management)?
This social media platform suffered a massive data breach in 2018, exposing the personal information of 50 million users.
What is Facebook?
This type of malware locks users out of their systems or data and demands payment, often via cryptocurrency, to restore access.
What is Ransomware?
30% to 50% of all data lost can be attributed to this type of person, one who is already employed by the target company.
What is an Insider Threat?
This tool monitors and filters incoming and outgoing network traffic based on predetermined security rules
What is a Firewall?
This term refers to structured, state-sponsored groups dedicated to mapping out the internet addresses for the purpose of espionage and possible computer/network attacks.
What is State-Sponsored Hacking?
What is Sony Pictures?
A legal notification directing you or the bureau/office to preserve any documentary material that may be relevant to a pending or foreseeable lawsuit or administrative adjunction.
What is a Litigation Hold?
A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.
What is Standardization?
This tool scans a system for known open exploits using a constantly updated database.
What is a Vulnerability Scanner?
This is the first recommended action to take if you receive an unexpected email attachment or link from an unknown sender
What is Do Not Click on It (Do Not Open It)
In 2021, this cyberattack targeted a major U.S. pipeline operator, distrupting fuel supplies across the East Coast.
What is the Colonial Pipeline attack?