What is cybersecurity?
The practice of protecting systems, networks, and programs from digital attacks.
What is malware?
Malicious software designed to damage or disrupt systems.
What is antivirus software used for?
Detecting and removing malware.
What is the principle of least privilege?
Granting users only the permissions they need to perform their job functions.
Why is cybersecurity important?
It protects sensitive data, ensures data integrity and availability, prevents financial losses, and maintains public trust in technology.
What is phishing?
Deceptive attempts to obtain sensitive information through emails, fake websites, or messages.
What does a firewall do?
Monitors and controls incoming and outgoing network traffic.
Why is multi-factor authentication important?
It adds an extra layer of security by requiring multiple forms of verification.
Name two key components of cybersecurity.
Protecting data and ensuring privacy.
What is social engineering?
Manipulating people into divulging confidential information.
What is Wireshark used for?
Monitoring network traffic and troubleshooting network issues.
What is network segmentation?
Dividing a network into smaller parts to improve security and manageability.
What can be compromised in a cyber attack?
Personal data, financial information, intellectual property, and operational systems.
Name three types of malware.
Viruses, worms, ransomware.
What is Nmap used for?
Discovering hosts and services on a network and for security auditing.
What is an intrusion detection system (IDS)?
A system that monitors network traffic for suspicious activity and potential threats.
What are the three pillars of cybersecurity?
Confidentiality, Integrity, and Availability (CIA triad).
What is ransomware and how does it typically spread?
Ransomware is a type of malware that encrypts files and demands a ransom for their release. It typically spreads through phishing emails and malicious downloads.
Name a tool used for encryption.
Tools such as PGP (Pretty Good Privacy) or GnuPG (GNU Privacy Guard).
What is the purpose of a security policy?
To establish guidelines and rules for protecting an organization's assets and information.