What is the term for protecting data, devices, and networks from threats?
Cybersecurity
What is the term for software designed to harm a computer?
Malware
What type of attack involves urgent, fear-inducing messages?
Phishing
What security measure encrypts data sent over the internet?
VPN
What do you call a malicious program disguised as legitimate software?
Trojan
What is a digital space where data is communicated over computer networks?
Cyberspace
What kind of attack involves tricking users into revealing sensitive information?
Phishing
What do you call a technique that uses fear to manipulate victims?
Scareware
What do you call a password-protected access method?
2FA
What type of malware replicates itself to spread to other computers?
Worm
What principle ensures that data is only accessible by authorized individuals?
Confidentiality
What type of malware encrypts your data for ransom?
Ransomware
What is the term for pretending to be someone else online?
Impersonation
What is a common tool to prevent unauthorized access to networks?
Firewall
What is the process of converting data into unreadable code?
Encryption
What principle ensures that data is accessible when needed?
Availability
What type of malware records keystrokes?
Spyware
What type of social engineering involves making false promises?
Baiting
What is a digital tool for managing passwords securely?
Password Manager
What is a method for attackers to deny users access to information?
Denial-of-service (DoS)
What principle ensures that data has not been altered or tampered with
Integrity
What is the term for unauthorized mining of cryptocurrency?
Cryptojacking
What kind of attack uses fake URLs to deceive users?
Pharming
What is a method for securing email communication?
Pretty Good Privacy (PGP)
What method involves attackers hijacking a session between two parties?
Session Hijacking