This term refers to the psychological manipulation of people into performing actions or divulging confidential information.
What is social engineering?
This component of the CIA triad focuses on ensuring that information is only accessible to those authorized to view it.
What is confidentiality?
This component is often referred to as the "brain" of the computer, responsible for processing instructions.
What is the Central Processing Unit (CPU)?
This protocol is used to securely transmit data over the internet, providing a secure channel over an insecure network
What is HTTPS (Hypertext Transfer Protocol Secure)?
This type of cyberattack involves sending fraudulent emails that appear to be from a reputable source to trick individuals into revealing personal information.
What is phishing?
Phishing is a common method of social engineering that often uses this type of communication to trick victims.
What is email?
This part of the CIA triad ensures that data remains accurate and unaltered during storage and transmission.
What is integrity?
This type of memory temporarily stores data that is being used or processed by the CPU.
What is Random Access Memory (RAM)?
This type of attack involves overwhelming a network with traffic to disrupt service availability.
What is a Denial of Service (DoS) attack?
This cyberattack method uses malicious software to encrypt a victim's files, demanding payment for the decryption key.
What is ransomware?
This social engineering technique involves posing as a trusted individual to gain sensitive information from a target.
What is pretexting?
This aspect of the CIA triad refers to ensuring that information and resources are available to authorized users when needed.
What is availability?
This component is used to store data permanently and is non-volatile, meaning it retains information even when powered off.
What is a Hard Disk Drive (HDD) or Solid State Drive (SSD)?
This network device is used to connect multiple devices within a local area network (LAN) and can also filter traffic.
What is a switch?
In this cyberattack, hackers exploit vulnerabilities in software to gain unauthorized access to a system, often leading to data breaches.
What is an exploit or a zero-day attack?
This type of social engineering attack involves creating a sense of urgency to trick individuals into making hasty decisions.
What is urgency or scare tactics?
Encryption is a common method used to protect this component of the CIA triad.
What is confidentiality?
This component connects the CPU to other parts of the computer and allows for communication between them.
What is the motherboard?
This type of malware disguises itself as legitimate software but can harm your system once installed.
What is a Trojan horse?
This type of attack involves intercepting and altering communication between two parties without their knowledge.
What is a man-in-the-middle (MitM) attack?
This tactic in social engineering involves an attacker gaining physical access to a restricted area by impersonating an employee or a maintenance worker.
What is tailgating or piggybacking?
A data breach that compromises the accuracy of information would violate this part of the CIA triad.
What is integrity?
This device converts digital signals from the computer into analog signals for transmission over telephone lines or other media.
What is a modem?
This security mechanism uses a combination of hardware and software to monitor and control incoming and outgoing network traffic based on predetermined security rules.
What is a firewall?
This term describes the act of observing someone’s private information, such as passwords or PINs, by looking over their shoulder.
What is shoulder surfing?