Information
Physical Security
Availability
The Enemy
Internet
100

This is the unauthorized access and use of someone’s personal information.

What is identity theft?

100
The list of computers, laptops, software, equipment owned by an organization.
What is Inventory?
100

This practice involves saving copies of important data in case of loss.

What is data backup?

100

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. 

Who are hackers?

100

Public networks, like those found in coffee shops, are often considered this.

What is unsecure?

200

This term describes the requirement of two or more verification methods to access an account.

What is Multi-Factor Authentication (MFA)?

200

These are long, complex combinations of letters, numbers, and symbols that protect your accounts.

What are strong passwords? 

200

This term refers to the process of verifying the identity of a user before granting access.

What is authentication?

200

A term that describes a technique used to trick individuals into giving up personal information.

What is phishing?

200

This app generates time-based codes for MFA, helping users verify their identity securely.

What is an authenticator app?

300

These are guidelines and rules designed to protect sensitive information.

What are security policies?

300

This form often used in MFA scans unique physical traits like fingerprints or faces.

What is biometric authentication?

300
To apply or maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.
What is Access Control?
300
These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.
Who are organized crime groups?
300

This type of attack involves intercepting communication between two parties without their knowledge.

What is a man-in-the-middle attack?