Cybersecurity 1.1.1
Cybersecurity 1.1.2
Cybersecurity 1.1.3
Cybersecurity 1.1.4
Malware
100

the information we create and use when interacting with online services like apps and websites

What is data

100

what are the guiding principles behind information security

what is confidentiality, integrity, and availability

100

 a point at which there is potential for a security breach

what is vulnerability

100

what is the first step in protecting systems from attack

what is identifying vulnerabilities

100

malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action

what is ransomware

200

any information about individuals

what is personal information

200

 the data about people and their financial records

what are the information assets

200

some danger that can exploit a vulnerability

what is a threat

200

what does the acronym IoT stand for

what is internet of things

200

records the activities of the user, such as the passwords they type into the computer and transmits this information to the person who wrote the malware

what is spyware

300

what are the three pillars of cybersecurity

what is people, processes, and technology

300

verifying the identity of the user

what is authentication

300

action you take to protect your information against threats and vulnerabilities.

what is a countermeasure

300

what can you use to find computers connected to the internet

what is shodan

300

are created using malware that allows an attacker to control a group of computers and use them to gather personal information or launch attacks against others, such as for sending spam emails or flooding a website with so many requests for content that the server cannot cope, called a denial-of-service attack

what are botnets

400

includes social media posts and private messages that we generate when interacting with websites

what is content

400

about ensuring that users cannot deny knowledge of sending a message or performing some online activity at some point later in time

what is non repuditation

400

emails that are fake and want you to click on a link to give you malware

what is phishing

400

is shodan legal

what is yes

400

someone who hacks for a protest against the government

what is a hacktivist

500

information about the way in which we produce data

what is user behavior

500

the term for malicious software

what is malware

500

how many unique passwords were found in january of 2019 when troy hunt published those details

what is 21 million

500

what are some good sources to stay up on cybersecurity news

what is government sites, news sites, technology sites, blogs, and information security companies.

500

someone who commits crimes over the internet

what is a cybercriminal