This is the practice of protecting networks and data from unauthorized access.
What is Cybersecurity
This malware demands payment to release your data
What is Ransomware?
This term refers to any action or device that lessens vulnerabilities.
What is a control?
The NIST Framework is Mandatory. T or F?
What is False?
This sector uses cybersecurity to safeguard personal health information, often targeted by ransomware.
What is Healthcare?
This 2021 cyberattack targeted the Colonial oil pipeline system, causing widespread fuel shortages on the East Coast. What was the method of attack utilized by the group Darkside on the pipeline?
What is Ransomware?
This term describes a weakness in a system that can be exploited.
What is a Vulnerability?
This attack floods a service with excessive traffic to disrupt normal operations.
What is DDoS?
The basic action of regularly updating software and systems.
What is patching?
This organization advocates for best practices in internet security
What is CIS? (Center for Internet Security)
Cybersecurity measures in this sector aim to secure transactions and protect against identity theft and fraud
What is the Financial Sector?
In cybersecurity, this is the practice ensuring that data is accurate and unaltered.
What is Integrity?
This technique might involve a fake prince asking for money.
What is Phishing?
What are "best practice recommendations within the CIS Controls"?
What is a safeguard?
This model supports communities in developing cybersecurity responses.
What is the CCSMM?
This work from professionals in the cybersecurity sector is critical for preventing disruptions in power grids and factories
What is the Industrial Sector?
Which principle restricts data viewing to high-clearance eyes only?
What is confidentiality?
This involves unsecure websites without secure protocols.
What is HTTP?
This critical security control ensures that even if data is intercepted, it remains unreadable without a special key.
What is encryption?
Protect, Respond, and Identify are 3 of the 5 core NIST Functions. Name the other 2.
What are Detect and Recover?
Risk refers to the potential for loss or damage when a ___ exploits a vulnerability.
What is a Threat?
These are the three main aspects of any cybersecurity strategy.
What is PPT? (People, Process, Technology)
This self-replicating cyber threat spreads without user action.
What is a Worm?
Among the best practices to protect against pervasive threats, this type of software scans and removes malicious programs.
What is Anti-Malware?
This NIST aids organizations in understanding and managing their cybersecurity ____.
What is Risk?
Name a federal agency associated with defining Cybersecurity practices
What is the Cybersecurity and Infrastructure Security Agency (CISA)?