This type of attack tricks users into giving up sensitive information through fake emails.
What is phishing?
This tool encrypts your internet connection, especially on public Wi-Fi.
What is a VPN?
This system monitors and controls industrial processes.
What is SCADA?
This federal agency helps defend critical infrastructure from cyber threats.
What is CISA?
This tool scans networks for vulnerabilities and open ports.
What are cyber scan tools?
Malicious programs that extort money from their victims by blocking access to the computer or encrypting the data stored on it until the victim pays.
What is Ransomware?
This system monitors and controls incoming and outgoing network traffic.
What is a firewall?
This device executes control logic in industrial automation.
What a PLC?
This organization enforces environmental regulations and may oversee compliance.
What is DEQ?
This network segmentation method improves security by isolating traffic.
What is VLAN?
This broad term refers to any software designed to harm or exploit systems.
What is malware?
This device stores data centrally and allows network access to files.
What is a NAS?
This interface allows operators to interact with machines and systems.
What is an HMI?
This federal agency investigates cybercrime.
This refers to wireless local area networking.
What is WLAN?
This attacks manipulates people rather than technology to gain access.
What is social engineering?
This type of switch allows configuration, monitoring, and VLAN setup.
What is a managed switch?
These devices provide computing resources and services across a network.
What are servers?
This person or group is responsible for owning and maintaining the system.
Who is the owner?
This describes the difference between information technology systems.
What is IT vs. OT?
This type to attack targets third-party vendors to compromise a system.
What is a supply chain attack?
This specialized computer is used for designing, controlling, or monitoring industrial systems.
What is an engineering workstation?
These are portable devices like phones and/or tablets that can pose security risks.
This university may be involved in research or cybersecurity collaboration.
What is BSU?
This model divides industrial control systems into hierarchical security levels.
What is the Purdue Model?