What is false?
One pillar of the CIA triad that ensures only authorized users can access resources.
What is confidentiality?
This term describes a weakness in hardware, software, or procedures that can be exploited.
What is a vulnerability?
This component is considered the brain of the computer.
What is central processing unit (CPU)?
The umbrella term to describe malicious software designed to harm, steal, or disrupt
What is malware?
Provide two (2) reasons why regulatory compliance is important.
What are any of the following:
Legal obligation: avoid fines and enforcement actions
Builds trust with customers, partners, and
stakeholders
Encourages baseline security practices and
accountability
The CIA triad pillar that ensures information is correct and unaltered.
What is integrity?
The chance that a threat will exploit a vulnerability and cause harm is called this.
What is risk (or risk level)?
True or false: Microsoft Office 2010 is an example of hardware.
What is false?
This type of malware encrypts data until a payment is made.
What is ransomware?
Jorge is winning 2K, and Manuel gets jealous and pours coffee on the game console. The game immediately leaves the screen. Which element of the CIA Triad is involved in this element?
What is availability?
The CIA triad pillar concerned with systems and data being available when needed.
What is availability?
Fill in the blank with a vocab word from this week: Jane installed wooden panels on her home's windows before a hurricane came to __________ its impact.
What is mitigate?
Provide three (3) examples of output devices.
What are any of the following: monitor, speaker, headphones, 3-d printer, paper printer
The difference between a virus and a worm
What is worms are self-spreading, while viruses need user action?
What does PII stand for?
What is Personally Identifiable Information?
A hacker who uses skills to find and fix security flaws for organizations, often with permission and ethical intent.
What is a white hat hacker?
What's included in an organization's cyberattack surface?
What are all points an attacker can use:
internet-facing systems, user devices, cloud services, third-party integrations, APIs, wireless networks
OR examples?
What is router (or modem)?
What is a Trojan horse?
True or false: All blue hat hackers are white hat hackers, but not all white hat hackers are blue hat hackers.
What is true?
A hacker who is still new to hacking and often uses pre-made codes and scripts.
What is a script kiddie OR green hat hacker?
Name at least one (1) issue that could arise from an attack on a city's critical infrastructure?
What are any of the following:
service disruptions, public safety threats, and economic impact?
The component connects all components together.
What is motherboard?
Complete this sentence: Marcie hacked into her neighbor's Roomba smart vacuum and got the layout of their house to rob it. This is just 1 example of how _______ devices can be dangerous.
What is Internet of Things (IoT)?