The two actors interact in environmental security.
Environment
Human
The three pillars every cybersecurity specialist should know.
Confidentiality
Integrity
Availability
The phenomenon of transmitting false or incomplete information.
Misinformation
The popular method of authentication that organizations use to make username and password mechanisms more robust.
Second Factor Authentication
A popular retail store that was attacked through its HVAC vendor.
Target
The type of contamination that can affect our ability to concentrate.
Air pollution
A common social engineering attack that involves the impersonation of a trusted party.
Phishing
A notorious federal employee that flew from Hawaii to Hong Kong and then to Russia.
Edward Snowden
The mechanism that organizations use to minimize the risk of new employees.
Screening
The type of malware we are defending against when we cover our webcams.
Spyware
The reason why the ancient greeks relied on imports.
The Soil
The type of malware that hides inside a file.
Trojan Horse
The country that was affected by Stuxnet.
Iran
The mechanism to access the risk on an organization.
Risk assessment
Popular security control that filters the port traffic of a device.
Firewall
Water
The northern European country that held the entire general elections using electronic voting.
Estonia
The northern European country that held the entire general elections using electronic voting.
Estonia
The three types of security controls in any organization.
Operational
Managerial
Technical
A notorious hacker that sought refugee in the Ecuadorean embassy in London.
Julian Assange
The scale used to measure earthquakes
Richter scale
The pillar of security that is mainly affected during a DDoS attack.
Availability
The security mechanism that Edward Snowden relied on to share state secrets.
Encryption
The type of attack hackers use to kidnap data from organizations.
Ransomware
Offical regulation that protects data and privacy in Europe.
General Data Protection Regulation (GDPR)