What does the term "phishing" refer to?
A type of cyber-attack where attackers attempt to trick users into revealing personal information by pretending to be a legitimate entity.
What is malware?
Malicious software designed to damage, disrupt, or gain unauthorized access to systems.
What is the first thing you should do if you suspect your computer is infected with malware?
Run a malware scan using trusted antivirus software.
What is encryption?
The process of converting data into a code to prevent unauthorized access.
What is a router, and why is it important for network security?
A router connects devices to the internet and helps manage data traffic; it should have strong security settings to protect against unauthorized access.
What should you do if you receive an email from an unknown sender asking for sensitive information?
Do not respond, and report the email as phishing or spam.
What is the difference between a virus and a worm?
A virus attaches itself to a program or file, while a worm is a self-replicating program that spreads without needing a host.
How can updating software prevent malware infections?
Updates patch security vulnerabilities that malware can exploit
What is SSL/TLS encryption commonly used for?
To secure online communications, especially in transactions and login forms.
What is Wi-Fi encryption?
The use of encryption protocols (like WPA2) to secure wireless internet connections from unauthorized access.
What is the purpose of two-factor authentication (2FA)?
It adds an extra layer of security by requiring a second form of verification, such as a text message or authentication app.
What is a ransomware attack?
A type of malware that encrypts files on a victim's computer and demands payment for decryption
What is a firewall?
A security system that monitors and controls incoming and outgoing network traffic, helping block unauthorized access
What is end-to-end encryption in messaging apps?
It ensures that only the sender and recipient can read the messages, preventing interception by third parties
What is the purpose of a Virtual Local Area Network (VLAN)?
It segments network traffic to improve security and manageability within large organizations.
How can you protect your devices from unauthorized access?
Use strong, unique passwords and enable screen locks.
What is a DDoS (Distributed Denial of Service) attack?
An attack that overwhelms a system with traffic, causing it to crash or become unavailable.
Why should you avoid downloading software from untrustworthy sources?
It could contain malware or other harmful programs.
What is the main purpose of encrypting sensitive data?
To protect the confidentiality of the data, especially during storage and transmission.
What does a security patch do?
It fixes vulnerabilities in software that could be exploited by attackers.
What is a VPN and why should you use one?
What is a botnet?
A network of compromised computers or devices controlled by a cybercriminal to carry out malicious activities.
What is the role of an antivirus program in preventing malware?
It detects, quarantines, and removes malware from your computer.
How can businesses use encryption to protect customer data?
By encrypting sensitive information such as credit card details or personal identifiers in their databases
What is the role of a network intrusion detection system (NIDS)?
To monitor network traffic for suspicious activity and alert administrators about potential security breaches.