Types of Cyber Attacks
Cybersecurity Tools
Cybersecurity Managed Services
Cybersecurity Professional Services
Cybersecurity Buzzwords
100

This is email based cyberattack that tricks users into giving up personal information

What is Phishing?

100

This type of software scans endpoints for vulnerabilities?

What is a Vulnerability Scanner?

100

A cybersecurity process that involves collecting, analyzing, and reviewing network data for signs of malicious activity or unauthorized access.

What is Network Security Monitoring?

100

This authorized cyber attack from outside of your network that helps to identify exploitable systems, software vulerabilities, access to your systems.

What is a Penetration Test?

100

SOC

What is Security Operations Center?

200

This type of malware encrypts files and demands payment for decryption.

What is ransomware?

200

This security tool continuously monitors endpoints for suspicious activities and provides real-time detection of threats.

What is Endpoint Detection and Response (EDR)?

200

This service protects endpoints, such as desktops, servers, laptops, and virtual machines, extending security from known signatures to patters to detect & prevent sophisticated attacks on the endpoint.

What is Managed Endpoint Detection & Response (MEDR) or EDR?

200

This professional service evaluates a school district’s people, processes, and technology to identify gaps and provide a roadmap aligned to NIST, CIS, CCRE and K–12 best practices.

What is a Cybersecurity Risk or Maturity Assessment?

200

PAM

What is Privileged Access Management, which secures and monitors administrator and high-risk accounts within a school district?

300

This attack targets K12 business offices by compromising or impersonating a leaders email accounts, often to authorize fraudulent wire transfers.

What is Spoofing?

300

Security Teams use this technology to collect, analyze and correlate security alerts from multiple sources.

What is a Security Information and Event Management system (SIEM / aka XDR)?

300

This service protects students and staff by filtering malicious or inappropriate content while helping districts meet CIPA compliance requirements.

What is Managed Web Content Filtering?

300

This facilitated exercise tests your knowledge and execution of your incident response plan to help enable collaboration and identify gaps in a lower stress environment.

What is a Tabletop Exercise?

300

SIEM

What is Security Information and Event Management, a platform that aggregates and analyzes security logs across district systems?

400

These attacks trick individuals into breaking normal security procedures by exploiting human psychology rather than technological vulnerabilities.

What is social engineering?

400

This technology creates a logical isolated virtual environment to safely execute suspicious files or code?

What is a sandbox?

400

This service actively searches, scans, and collects data from dark web sources to identify potential cybersecurity threats and stolen information.

What is dark web monitoring?

400

This service helps districts design a modern security framework that assumes no user or device is trusted by default, even inside the school network.

What is Zero Trust Architecture Design?

400

DLP

What is Data Loss Prevention, the technology that helps prevent sensitive student and staff data from being leaked or exfiltrated?

500

This increasingly common attack method targets trusted third-party vendors or software providers to compromise their customers, allowing attackers to affect multiple organizations with a single breach.

What is Supply Chain Attacks?

500

This cloud security technology can identify and remediate misconfigurations.

What is Cloud Security Posture Management (CSPM)?

500

This service ensures school systems and student data can be rapidly restored after ransomware, hardware failure, or natural disasters through secure backups and recovery testing.

What is Managed Backup and Disaster Recovery (BDR)?

500

This emergency services helps organizations rapidly investigate, contain and remediate active security breaches to minimize organizational damage.

What is Incident Response?

500

DRaaS

What is Disaster Recovery as a Service, a cloud-based approach to restoring critical school systems after ransomware or outages?

M
e
n
u