The process of converting plaintext into unreadable code.
What is encryption?
A security software that acts as a gatekeeper for network traffic
What is a firewall?
Fraudulent emails designed to steal personal information
What is phishing?
This type of attack overwhelms a network, making services unavailable to users.
What is a DDoS attack?
In 2013, this major retail company suffered a data breach exposing credit card details
What is Target?
This cryptographic method uses two keys: a public key and a private key.
What is asymmetric encryption?
This policy limits user access rights to only what is needed for their role.
What is the principle of least privilege?
Impersonating someone’s boss to gain information or access.
What is spear phishing?
This malware disguises itself as legitimate software but performs malicious actions in the background
What is a Trojan?
The first step in incident response, aimed at identifying and confirming a breach.
What is detection?
The most common hash function used in cybersecurity, creating a 256-bit hash
What is SHA-256?
This detection tool analyzes traffic to identify suspicious patterns
What is an IDS or Intrusion Detection System?
This attack involves tricking someone into revealing private information over the phone.
What is vishing?
Attackers use this technique to guess a password by testing all possible combinations.
What is brute-force attack?
In 2017, this massive credit agency experienced a breach affecting over 140 million Americans.
What is Equifax?
The technique of hiding messages within other files, often images or audio
What is steganography?
A security technique used to separate critical systems from untrusted networks.
What is network segmentation?
A sophisticated scam targeting top-level executives.
What is whaling?
This attack intercepts communication between two parties without their knowledge.
What is a man-in-the-middle attack?
This term describes a security weakness that allows unauthorized access.
What is a vulnerability?
Named after a Greek historian, this cipher technique shifts letters in the alphabet
What is Caesar cipher?
his protocol ensures secure data transmission over the internet, often seen with “https.”
What is SSL/TLS?
This redirection attack tricks users into entering credentials on a fake website.
What is pharming?
The method of tricking DNS servers into sending users to fake websites.
What is DNS spoofing?
This breach in 2021 targeted multiple software supply chains, affecting companies worldwide.
What is the SolarWinds breach?