Passwords
Malware
Social Engineering
Cyber Hygiene
Acronyms
100

This is a secret combination of characters used to gain access to a secure system, such as an online account or computer

What is a password?

100

This type of malware demands money in order to restore files

What is ransomware?

100

A scam email asking for your login information is an example of this

What is phishing?

100

A common method to backup your files in case of a cyberattack

What is a backup?

100

This requires users to provide "multiple" forms of identification to verify their identity. (This is different than 2FA)

What is MFA?

200

The password "123456" is considered what?

What is a weak password OR what is a bad password?

200

This type of malware often hides in email attachments or fake downloads

What is a virus?

200

This type of attack targets high-profile individuals

What is spear phishing?

200

Keeping your software updated will help patch these

What are vulnerabilities?

200

This creates a secure, encrypted connection between your device and the internet

What is a VPN?

300

This attack uses a list of common passwords to attempt to crack a password

What is a dictionary attack?

300

This malware disguises itself as a piece of legitimate software

What is a trojan?

300

This attack involves sending fake texts to trick users into clicking malicious links

What is smishing?

300

This control ensures only the right people have access to files

What is access control?

300

This "triad" has 3 components. Confidentiality, Integrity, and this.

What is Availability?

400

This type of protection sends a code to your device when logging in

What is 2FA?

400

This malware self-replicates itself, meaning it spreads without needing user action

What is a worm?

400

This attack involves individuals searching through trash to find sensitive information

What is dumpster diving?

400

This principle ensures users should only have the minimum access and permissions necessary to perform their jobs.

What is Principle of Least Privilege?

400

This system monitors for malicious activity

What is IDS?

500

Passwords are often stored in this type of one-way encrypted format, making them difficult to reverse-engineer

What is a hash?

500

This malware gives attackers remote control over your system

What is a Remote Access Trojan (RAT)?

500

This attack involves compromising a trusted business partner to reach the actual target

What is a supply chain attack?

500

This type of attack simulates attacks to check for weaknesses

What is penetration testing?

500

This system collects, analyzes, and correlates security data from various sources

What is a SIEM?