This term refers to the protection of computer systems, networks, and data from theft, damage, or unauthorized access.
What is Cybersecurity?
This type of authentication method involves using a sequence of words or a sentence as a password, typically longer and more memorable than traditional passwords.
What is a passphrase?
This global standard outlines security requirements for organizations that handle credit card transactions to protect cardholder data from theft and fraud.
What is Payment Card Industry(PCI-DSS)?
This type of phishing is a targeted attack
What is spearphishing?
Software created by hackers with the intention of stealing data and/ or damaging our internal systems is known as.
What is malware?
A secure, private network that you can connect to over the internet.
What is a VPN?
What is the term for a tool that securely stores and manages passwords for various accounts?
What is a password manager or vault?
This U.S. legislation sets standards for the protection of sensitive patient health information and regulates its use and disclosure by healthcare providers and organizations.
What is Health Insurance Portability and Accountability Act(HIPAA)?
This type of phishing attack uses phone calls or voice messages to deceive individuals into providing sensitive information or performing certain actions.
What is vishing?
This type of malware replicates itself to spread to other computers.
What is a virus or worm?
This common cybersecurity threat involves tricking individuals into disclosing sensitive information or clicking on malicious links through deceptive emails or websites.
What is phishing?
The recommended minimum length for a strong password?
What is 12 characters?
This U.S. legislation mandates strict financial reporting and disclosure requirements for publicly traded companies to prevent accounting fraud and protect investors.
What is Sarbanes Oxley(SOX)?
DAILY DOUBLE!
This variant targets high-ranking individuals or executives within an organization, aiming to steal sensitive information or gain unauthorized access to corporate networks.
This malware type is designed to block access to a computer system until a sum of money is paid.
What is ransomware?
This is the process of converting information or data into a code to prevent unauthorized access.
What is encryption?
True or False: A strong password should include upper and lowercase letters, numbers and symbols.
What is True?
This California state law grants consumers greater control over their personal information held by businesses and imposes strict requirements on the collection, use, and sale of personal data.
What is the California Privacy Rights Act(CPRA)/ California Consumer Protection Act (CCPA)?
This type of phishing involves a SMS text message
What is smishing?
An approach to gain access to information through misrepresentation commonly by impersonation
What is social engineering?
This security measure involves confirming the identity of users or systems before granting access to resources or data, typically through passwords, biometrics, or security tokens.
What is authentication?
This term refers to the set of rules and requirements established by an organization to govern the creation, usage, and protection of passwords by its employees or users
What is a password policy?
This European Union regulation governs the protection of personal data and privacy for individuals within the EU and European Economic Area.
What is General Data Protection Regulation(GDPR)?
This technique uses fraudulent emails that appear to come from a legitimate sender, such as a bank or government agency, to trick recipients into taking action.
What is email spoofing?
This type of attack floods a network or system with excessive traffic or requests, causing it to become slow, unresponsive, or unavailable to legitimate users.
What is a DDos attack?