You receive an urgent message from your bank saying your account has been frozen due to unauthorized access attempts. It says you must reset your password to unlock your funds via an included link. What should you do?
What is Go to the main bank website and log into your account?
These should be used in addition to passwords on devices?
What are PINs or passcodes?
________is a type of security attack where scammers trick people into giving them access to sensitive information
What is social engineering?
Doing this can help prevent malware from infecting your computer.
Updating your web browser.
____is the practice and study of techniques for securing information and communication mainly to protect the data from third parties that the data is not intended for.
What is Cryptography?
_________ are targeted and deceptive emails sent to you in order to gain information, access, or money. The intent is malicious.
What is phishing emails?
_______ are longer passwords composed of multiple, random words
What are Passphrases?
A small, focused, targeted attack via email on a particular person or organization with the goal to penetrate their defenses.
What is spear phishing?
This type of malware will encrypt your computer and hold data hostage for money
What is Ransomware?
_______is used to create a safe and encrypted connection.
What is a VPN or Virtual Private Network?
________ is an unsolicited email that attempts to sell you a product or service. It’s mainly a nuisance, but not necessarily harmful.
What is spam?
To remember strong passwords, you can do this in order not to forget them
What is use password management software with encryption?
The right of individuals to remove their personal data from being stored or used by an organization is called?
What is the Right to be Forgotten?
______monitors user activities for marketing purposes or keylogs user credentials
What is Spyware?
_______ is the process of finding vulnerabilities on the target. In this case, the organization would have set up all the security measures they could think of and would want to test if there is any other way that their system/network can be hacked.
What is a Penetration test?
When ________ successfully obtain user credentials for some systems, they not only gain access to the accounts that use the credentials, but they can potentially access high-value organizational data.
What are phishers?
An extra layer of security is known as
What is multi-factor authentication?
Social engineers will do this before contacting an employee. It’s done through social media, websites, and other resources.
What is Research?
_____act as traffic cops for network activity and block anything suspicious.
What are Firewalls and intrusion detection systems?
Encrypted data can be converted back to original data by the process of decryption but _____data cannot be converted back to original data.
What is Hashed data?
___(fake SMS/texts) messages entice, trick, and scare users into clicking
What is smishing?
______ is a way of finding out the right credentials by repetitively trying all the permutations and combinations of possible credentials.
What is a Brute Force attack?
A method used by social engineers to gain access to a building or other protected area.
What is Tailgating?
_____ is a type of cyberattack where a malicious actor inserts themselves into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other.
What is a man-in-the-middle attack?
CIA stands for ________ and is a model that is designed to guide policies for Information Security. It is one of the most popular models used by organizations.
What is Confidentiality, Integrity, and Availability?