Security Fundamentals
Threats and Malware
Physical & Data Security
Cryptography
Risk and Governance
100

The "A" in the CIA Triad that ensures systems and data are accessible to authorized users when needed.

What is Availability?

100

A social engineering attack where fraudulent emails are sent to trick users into revealing sensitive information.

What is Phishing?

100

Short, sturdy posts designed to prevent vehicles from ramming into buildings or unauthorized areas.

What are Bollards?

100

This type of encryption uses a single shared key for both encryption and decryption.

What is Symmetric Encryption?

100

The process of identifying, assessing, and mitigating potential threats to an organization’s assets.

What is Risk Management?

200

his concept ensures that a sender cannot deny the authenticity of their actions, such as sending a message.

What is Non-Repudiation?

200

This type of malware encrypts a victim’s files and demands payment for the decryption key.

What is Ransomware?

200

The act of an unauthorized person following an authorized individual through a secure door without credentials.

What is Tailgating (or Piggybacking)?

200

A one-way process that transforms data into a fixed-size string of characters, acting like a digital fingerprint.

What is Hashing?

200

A type of risk analysis that uses numerical data and financial values to assess risk.

What is Quantitative Risk Analysis?

300

Passwords, PINs, and answers to security questions fall under this factor of authentication.

What is Something You Know?

300

A malicious program that disguises itself as legitimate software to deceive users into installing it.

What is a Trojan?

300

A secure entry system with two sets of doors where the first must close before the second opens.

What is an Access Control Vestibule (or Mantrap)?

300

The technique of adding a random value to a password before hashing it to prevent rainbow table attacks.

What is Salting?

300

A comprehensive EU regulation that governs data protection and privacy for individuals.

What is GDPR?

400

This security model operates on the principle of "never trust, always verify," assuming no user or device is trusted by default.

What is Zero Trust?

400

This social engineering technique involves creating a fabricated scenario or backstory to gain a target's trust.

What is Pretexting?

400

Data that is actively moving from one location to another, such as over the internet or a network.

What is Data in Transit?

400

A system that manages digital certificates and public-private key pairs to enable secure communication.

What is Public Key Infrastructure (PKI)?

400

A document that outlines the rules for how employees can use company IT resources like email and the internet.

What is an Acceptable Use Policy (AUP)?

500

Policies, training, and incident response plans fall under this category of security controls.

What are Administrative Controls?

500

A threat actor motivated by political or social causes rather than financial gain.

What is a Hacktivist?

500

The concept that data is subject to the laws and regulations of the country where it is physically stored.

 What is Data Sovereignty?

500

An asymmetric algorithm based on elliptic curves that is efficient for mobile devices and smart cards.

What is ECC (Elliptic Curve Cryptography)? 




500

The structured approach to managing modifications to IT systems to minimize disruptions and security risks.

What is Change Management?

M
e
n
u