The CIA Triad
Common Threats
Safe Surfing
Security Basics
Hackers & Heroes
100

The "C" in the CIA Triad stands for this principle, which ensures that data is accessible only to authorized users.

Confidentiality

100

This fraudulent practice uses deceptive emails to trick people into revealing personal information, like passwords.

phishing

100

A set of rules that defines how users can and cannot use an organization's computer systems.

Acceptable Use Policy

100

A piece of software that protects a computer from viruses.

antivirus software

100

These people break into computer systems with malicious intent.


black-hat hackers

200

The "I" in the CIA Triad refers to this principle, which ensures that data is not modified or tampered with by unauthorized parties

Integrity

200

This type of malware encrypts your files and demands a payment to restore them.

ransomware

200

This is the best way to protect your laptop when you leave it unattended, even for a short time.

to lock your screen or log off

200

Using something you know (a password) and something you have (a code sent via text) is an example of this

multifactor authentication (MFA)

200

These ethical hackers test the security of systems to identify vulnerabilities

white-hat hackers

300

This part of the CIA Triad ensures that systems and data are available when authorized users need them.

Availability

300

A seemingly harmless program that conceals malicious code, named after a story in Greek mythology.

Trojan

300

What you should do with an email attachment if it comes from an unknown sender?

 to not open it

300

 The process of making digital data unreadable to unauthorized individuals.

encryption

300

What is an organization's plan for how to handle security breaches when they happen?

an incident response plan

400

What is an organization's first line of defense, described as the weakest link in the security chain if not properly trained?

the human element or its people

400

This social engineering tactic involves manipulating someone into revealing confidential information, often by exploiting human trust.

social engineering

400

What you should do immediately if you believe you have fallen victim to identity theft?

to report it to the proper authorities or take immediate steps to secure your accounts

400

This is the most effective way to prevent software vulnerabilities from being exploited.

applying security patches and updates?

400

This type of threat comes from a current or former employee who has knowledge of the organization's systems.

an insider threat

500

True or false: The CIA Triad is a security model used for evaluating the security of a system or network

True

500

Unlike a virus, this type of malware can self-replicate and spread to other computers on a network without user interaction.

a worm

500

Disabling this action in your browser can help prevent a type of web-based attack called cross-site request forgery.

the "remember me" or "keep me logged in" function

500

A security measure that creates a protective barrier between your computer network and outside networks.

is a firewall

500

This type of hacker is motivated by political or ideological beliefs, often seeking to spread disinformation.


 a hacktivist