This type of attack floods a network with traffic to make it unavailable.
What is a DDoS attack?
The “C” in the CIA triad.
What is confidentiality?
A device or software that monitors and controls incoming/outgoing network traffic.
What is a firewall?
The process of converting plain text into coded text.
What is encryption?
A strong password should include letters, numbers, and this.
What are special characters?
This attack tricks users into revealing sensitive info through fake emails or websites.
What is phishing?
Ensuring data is accurate and not altered.
What is integrity?
Software designed to detect and remove malicious programs.
What is antivirus software?
The process of converting coded text back to readable form.
What is decryption?
Updating software regularly helps fix these.
What are vulnerabilities?
Malware that locks your files until payment is made.
What is ransomware?
Making sure systems and data are accessible when needed.
What is availability?
A secure connection over the internet often used for remote work.
What is a VPN?
A one-way function used to verify data integrity.
What is hashing?
Backups help recover data after this type of attack.
What is ransomware?
An attack where someone secretly intercepts communication between two parties.
What is a man-in-the-middle attack?
Verifying a user’s identity.
What is authentication?
This tool scans systems for known vulnerabilities.
What is a vulnerability scanner?
Encryption using two keys: public and private.
What is asymmetric encryption?
This method requires two forms of verification.
What is two-factor authentication (2FA)?
This exploit targets databases using malicious queries.
What is SQL injection?
Granting access based on permissions.
What is authorization?
A system that detects suspicious network activity.
What is an IDS (Intrusion Detection System)?
A widely used secure protocol for websites (HTTPS).
What is SSL/TLS?
The principle of giving users only the access they need.
What is least privilege?