This is a general term for a program designed to damage or disrupt computers.
What is malware?
This term describes emails that try to trick you into giving up sensitive info
What is phishing?
This type of password is the most secure: long, complex, and __________.
What is unique?
You should lock your computer when doing this
What is stepping away from your desk?
Cybersecurity Awareness Month started in this year
What is 2004?
Keeping your software and operating system updated helps protect against these.
What are security vulnerabilities?
A red flag of a phishing email is poor spelling, suspicious links, or this.
What is urgent or threatening language?
Using the same password on multiple accounts increases this risk.
What is a data breach or compromise?
Only use this kind of USB drive or external device
What is one provided or approved by IT?
This U.S. agency leads national cybersecurity efforts.
What is CISA (Cybersecurity and Infrastructure Security Agency)?
A type of software that guards your system against unauthorized access
What is a firewall?
A fake website that looks real and is designed to steal your data
What is a spoofed website?
A random group of characters stored in a password manager
What is a generated password?
Before clicking on links, you should do this
What is hover over the link or verify the source?
The EU's major privacy regulation introduced in 2018
What is GDPR (General Data Protection Regulation)?
The process of converting data into a coded form to prevent unauthorized access
What is encryption?
Phishing attempts by phone are often called this
What is vishing?
2FA stands for this cybersecurity best practice.
What is two-factor authentication?
These types of documents are often used to deliver malware
What are attachments (e.g., PDFs, Word documents)?
The first known computer worm to spread widely, in 1988
What is the Morris Worm?
This term refers to the act of defending computers and networks from digital attacks
What is cybersecurity?
SMS-based phishing attacks are referred to as this
What is smishing?
A method that sends a temporary code to your phone or email
What is multi-factor authentication (MFA)?
Keeping this type of software up to date is a top IT priority
What is antivirus or endpoint protection software?
This act makes unauthorized access to computers illegal in the U.S
What is the Computer Fraud and Abuse Act?
Public Wi-Fi can be risky because of this potential threat
What is data interception or man-in-the-middle attacks?
A phishing attack targeting high-level executives
What is spear phishing or whaling?
This type of password attack tries every possible combination
What is a brute-force attack?
You should never share your credentials with this group.
What is anyone, even coworkers?
This global event in 2017 affected systems in over 150 countries
What is the WannaCry ransomware attack?
The three core principles of cybersecurity
confidentiality, integrity, and __________. What is availability?
If you receive a suspicious message at work, your first step should be this.
What is report it to IT or your security team?
Biometric security uses these types of personal identifiers
What are fingerprints, facial recognition, or retina scans?
This regular event helps test an organization’s cyber response.
What is a cybersecurity drill or incident response simulation?
This person is credited with founding the field of computer security
Who is Willis Ware?