This term refers to the practice of securing a computer system or network to protect against unauthorized access or attacks.
What is cybersecurity?
This type of malware is designed to block access to a computer system until a sum of money is paid.
What is ransomware?
This network security system monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What is a firewall?
This practice involves regularly updating software, operating systems, and applications to patch known vulnerabilities.
What is software patching?
The process of converting information into an unreadable format to prevent unauthorized access is known as this.
What is encryption?
A malicious software that spreads from one computer to another, often causing damage or disrupting normal operations.
What is a computer virus?
A system that tracks, records, and analyzes activities on a computer or network to detect and respond to security incidents.
What is an Intrusion Detection System (IDS)?
The principle of providing individuals with the minimum levels of access and permissions necessary to perform their job functions is known as this.
What is the principle of least privilege?
A program that appears legitimate but actually carries out malicious activities when executed is called this.
What is a trojan horse?
This cyber threat involves overwhelming a system or network with a flood of internet traffic, making it unavailable for legitimate users.
What is a Distributed Denial of Service (DDoS) attack?
This tool is used to scan a computer system or network for vulnerabilities that could be exploited by attackers.
What is a vulnerability scanner?
Creating multiple, unique passwords for different accounts and changing them regularly is an example of following this cybersecurity best practice.
What is password hygiene?
The practice of tricking individuals into disclosing sensitive information, such as passwords, by pretending to be a trustworthy entity is known as this.
What is phishing?
Attackers gain unauthorized access to a system by exploiting a software vulnerability that the system's creator is unaware of. This is known as what?
What is a zero-day exploit?
A cryptographic protocol that provides secure communication over a computer network, commonly used for secure online transactions.
What is HTTPS (Hypertext Transfer Protocol Secure)?
Educating employees about potential cyber threats and how to recognize and avoid them is part of a comprehensive program in this area.
What is cybersecurity awareness training?
This authentication method involves confirming a user's identity by using a combination of something they know, something they have, and something they are.
What is multi-factor authentication (MFA)?
A cyber attack in which the attacker intercepts and alters communication between two parties without their knowledge.
What is a man-in-the-middle attack?
This technology involves the use of unique physical or behavioral traits, such as fingerprints or facial recognition, for user authentication.
What is biometric authentication?
In the context of data protection, this practice involves making multiple copies of important data and storing them in different locations.
What is data backup?