This is the process of converting information into a secure format, making it unreadable to unauthorized users.
What is encryption?
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Who are hackers?
This software is designed to detect and remove malicious programs from your computer.
What is antivirus software?
This is the recommended length for a secure password.
What is at least 12-16 characters?
In 2017, this ransomware attack affected hundreds of thousands of computers worldwide, exploiting a vulnerability in Microsoft Windows.
What is WannaCry?
This is a deceptive attempt to acquire sensitive information by pretending to be a trustworthy entity, often via email.
What is phishing?
A vulnerability in hardware or software that attackers exploit before the vendor has released a patch is referred to as this.
What is a zero-day exploit?
This phrase refers to the practice of using two or more verification methods to log in to a system.
What is multi-factor authentication (MFA)?
In 2013, this major retail chain experienced a data breach that compromised the credit card information of over 40 million customers.
What is Target?
This is the practice of testing a system or network for weaknesses that could be exploited by attackers.
What is penetration testing?
A secure network protocol that encrypts data between a web browser and a server, indicated by "https" in the URL.
What is SSL/TLS?
A regular process of installing updates to fix security vulnerabilities is commonly called this.
What is patch management?
This social media platform suffered a massive data breach in 2018, exposing the personal information of 50 million users.
What is Facebook?
This type of malware locks users out of their systems or data and demands payment to restore access.
What is ransomware?
This tool monitors and filters incoming and outgoing network traffic based on predetermined security rules.
What is a firewall?
In 2014, this entertainment company was hacked, allegedly by North Korea, over the release of the movie "The Interview."
What is Sony Pictures?
A tool used to evaluate the security of a network by simulating an attack.
What is a vulnerability scanner?
This is the recommended action to take if you receive an unexpected email attachment or link from an unknown sender.
What is do not open or click it, and report it to DT?
In 2021, this cyberattack targeted a major U.S. pipeline operator, disrupting fuel supplies across the East Coast.
What is the Colonial Pipeline attack?