This is a secret combination of characters used to gain access to a secure system, such as an online account or computer
What is a password?
This type of malware demands money in order to restore files
What is ransomware?
A scam email asking for your login information is an example of this
What is phishing?
A common method to backup your files in case of a cyberattack
What is a backup?
This requires users to provide "multiple" forms of identification to verify their identity. (This is different than 2FA)
What is MFA?
The password "123456" is considered what?
What is a weak password OR what is a bad password?
This type of malware often hides in email attachments or fake downloads
What is a virus?
This type of attack targets high-profile individuals
What is spear phishing?
Keeping your software updated will help patch these
What are vulnerabilities?
This creates a secure, encrypted connection between your device and the internet
What is a VPN?
This attack uses a list of common passwords to attempt to crack a password
What is a dictionary attack?
This malware disguises itself as a piece of legitimate software
What is a trojan?
This attack involves sending fake texts to trick users into clicking malicious links
What is smishing?
This control ensures only the right people have access to files
What is access control?
This "triad" has 3 components. Confidentiality, Integrity, and this.
What is Availability?
This type of protection sends a code to your device when logging in
What is 2FA?
This malware self-replicates itself, meaning it spreads without needing user action
What is a worm?
This attack involves individuals searching through trash to find sensitive information
What is dumpster diving?
This principle ensures users should only have the minimum access and permissions necessary to perform their jobs.
What is Principle of Least Privilege?
This system monitors for malicious activity
What is IDS?
Passwords are often stored in this type of one-way encrypted format, making them difficult to reverse-engineer
What is a hash?
This malware gives attackers remote control over your system
What is a Remote Access Trojan (RAT)?
This attack involves compromising a trusted business partner to reach the actual target
What is a supply chain attack?
This type of attack simulates attacks to check for weaknesses
What is penetration testing?
This system collects, analyzes, and correlates security data from various sources
What is a SIEM?