This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability.
White Hat
This software is a security program designed to prevent, detect, search and remove malware from computers.
Antivirus
This global satellite company was attacked at the onset of Russia's invasion of Ukraine resulting in thousands of customer modems being wiped and unusable.
Viasat
A fraudulent email pretending to be from your bank and asking for your login information is a classic example of this simple cyberattack, which is by far the most common cyberattack on the internet.
Phishing
Something you know, something you have, and something you are. Using more than one way to confirm identity when you sign in to a system is an example of this.
Multi-Factor Authentication
A website with a site certificate is one that uses encryption; this letter after http is one sign of it.
S
This type of malware holds your data hostage until you pay!
Ransomware
This professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016.
The 'D' in DDoS stands for this type of Denial of Service Attack.
Distributed
This is a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
Firewall
Companies consider cybersecurity when instructing employees with a policy on BYOD, short for this.
Bring Your Own Device
Not to be confused with CSS, CVSS is an acronym for Common ______ Scoring System—an industry standard for getting a numerical score to show how secure (or not) a computer system is.
Vulnerability
A ransomware attack that encrypted 3,800 city of Atlanta computers demanded 6 of these digital items to unfreeze them.
Bitcoin
This type of cybersecurity threat where nefarious actors trick others into revealing sensitive information. An example of this is when a scammer poses as tech support to gain access to someone's computer.
Social Engineering
Before Transport Layer Security (TLS) became the standard, Secure ______ Layer (SSL) was what kept your sensitive information safe as it was sent over the Internet.
Socket
The founder of this pioneering antivirus software company had a Netflix documentary made about him. The story included guns, drugs, and murder.
McAfee
This type of virus is described as malware which disguises itself as a normal program, which shares its name with a notable horse that invaded the ancient city of Troy during a famous 12th century B.C. war.
Trojan
In 2007 this retailer experienced the biggest breach of consumer data in the history of the United States at the time, with more than 45 million credit card numbers stolen.
TJ Maxx
This nation-state is widely regarded as the most sophisticated cyber force second to only the United States. Same ranking for economy size.
China
This NIST standard # outlines Security and Privacy Controls for Information Systems and Organizations.
800-53
Beware of these types of programs that track every stroke you make while typing in an effort to glean your password.
Keylogging
Though not sent on valentines day, this computer worm spread to over 10 million windows computers in May 2005 disguising itself as a letter from your secret admirer.
ILOVEYOU virus
This list is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. Globally recognized by developers as the first step towards more secure coding.
OWASP Top 10
Based on how poorly they are at launching rockets, you'd be surprised to find out how advanced the cyber capabilities of this country, though they usually only hack for financial gain.
North Korea
The four principle wireless (WiFi) encryption standards available at most access points are WPA, WPA2, WPA3, and this less-secure fourth option.
WEP
BONUS: Define WEP