Cybersecurity & Threats
Technology Concepts & Infrastructure
Cryptography & Privacy
Emerging Tech & Data Trends
Policy, Governance & Strategic Concepts
100

This term refers to software intentionally crafted to exploit system vulnerabilities, often for espionage or sabotage.

What is malware?

100

This distributed computing model enables on-demand resource access but introduces regulatory and privacy challenges.

What is cloud computing?

100

This encryption method relies on asymmetric key pairs and is foundational to secure e-commerce.

What is public key cryptography?

100

A subset of artificial intelligence, this field focuses on algorithms that improve through experience.

What is machine learning?

100

This international agreement set the legal foundation for cross-border cooperation on cybercrime investigations.

What is the Budapest Convention on Cybercrime?

200

Often leveraging social engineering, this cyberattack deceives users into self-compromising their security credentials.

What is phishing?

200

This emerging architecture disaggregates proprietary telecom infrastructure into modular, interoperable components.

What is Open RAN?

200

This encryption scheme, based on factoring large primes, underlies much of modern internet security.

What is the RSA (Rivest-Shamir-Adleman) algorithm?

200

This device utilizes quantum properties such as entanglement and superposition to solve complex problems beyond classical limits.

What is a quantum computer?

200

This model redefines network security by treating all access attempts as untrusted until explicitly verified.

What is Zero Trust?

300

This specific form of malware encrypts or locks down critical data and demands payment in exchange for restoration.

What is ransomware?

300

Cyber-physical systems like SCADA fall under this category, which, when attacked, can cause real-world physical disruption.

What is Operational Technology (OT)?

300

This quantum breakthrough threatens traditional encryption by solving integer factorization exponentially faster.

What is Shor’s Algorithm?

300

This immutable and transparent data structure underpins decentralized systems and eliminates the need for central trust.

What is blockchain?

300

This forensic process seeks to technically and politically link cyber intrusions to a responsible actor.

What is attribution?

400

This stealthy software variant is often bundled with legitimate apps and harvests data without explicit consent.

What is spyware?

400

This layered protocol suite underpins global data transmission, abstracting complexity through logical segmentation.

What is the Internet Stack?

400

Often used in insecure networks, this service masks traffic through encryption and rerouting.

What is a virtual private network?

400

Neither physical nor necessarily government-issued, this digital medium of exchange is often decentralized and cryptographic.

What is digital currency?

400

Though non-binding, this global multistakeholder platform facilitates dialogue on complex internet governance issues.

What is the Internet Governance Forum (IGF)?

500

These attacks exploit unpatched flaws that are unknown to software vendors and cybersecurity communities.

What are zero-day attacks?

500

Originally built for rendering graphics, this processor type now accelerates AI and scientific workloads through parallelism.

What is a Graphics processing unit?

500

This layered authentication approach reduces the risk of credential theft through physical and digital proof mechanisms.

What is multi-factor authentication (MFA)?

500

This blockchain-based token confers verifiable ownership of a digital asset, often in art or gaming.

What is a non-fungible token?

500

This national security doctrine leverages robust defense infrastructure to dissuade cyber or kinetic adversaries.

What is deterrence by defense?

M
e
n
u