Data Handling
Famous Cyber Attacks
Email Security
Security Toolbox
Authentication and Authorization
200

This security practice involves categorizing data based on its sensitivity and importance to the organization, allowing for appropriate protection measures to be implemented.

What is data classification?

200

This 2016 attack exposed the personal information of over 500 million users of this internet company.

What is the Yahoo breach?

200

If you receive an email that looks "phishy", this add-in sends it to be investigated.

What is the "Report Phishing" button?

200

This process involves simulating cyberattacks on a system to identify and fix security vulnerabilities before real attackers can exploit them.

What is penetration testing?

200

This authentication protocol allows users to securely access multiple applications or services using a single set of credentials, often through integration with identity providers.

What is Single Sign-On (SSO)?

400

The process of systematically destroying or scrubbing personal data that is no longer needed, to protect privacy.

What is (data) sanitization?

400

This former National Security Agency (NSA) contractor leaked classified documents revealing extensive government surveillance programs to the media in 2013.

Who is Edward Snowden?

400

This technology automatically identifies and blocks unsolicited or unwanted emails from reaching a user's inbox, reducing the risk of exposure to malicious content.

What is spam filtering (or detection)?

400

This security measure requires users to provide multiple forms of identification to verify their identity.

What is Multifactor Authentication?


400

This security practice involves regularly reviewing and updating user permissions and access rights to ensure they align with organizational policies and least privilege principles.

What is access control management?

600

This practice involves tracking who accesses data, when, and what actions they perform, often used in auditing and compliance.

What is logging?

600

DAILY DOUBLE!

This infamous cyber attack, initiated through a phishing email, led to the exposure of sensitive diplomatic cables and caused international embarrassment for the United States.

600

This type of intelligence provides organizations with timely and relevant information about emerging email security threats, enabling proactive defense measures and incident response.

What is threat intelligence?

600

This tool helps organizations prevent the unauthorized disclosure or leakage of sensitive data by monitoring, detecting, and blocking the transmission of sensitive information across networks and endpoints.

What is data loss prevention solution (DLP)?

600

This technology ensures that email messages are signed with a digital signature to verify the sender's identity and ensure the message's integrity.

What is DKIM (DomainKeys Identified Mail)?

800

This concept ensures that data remains unchanged during storage, transmission, and retrieval, preventing unauthorized modification.

What is data integrity?

800

This 2017 cyber attack targeted a credit company, compromising the personal information of over 147 million individuals.

What is Equifax?

800

This inbox is monitored by the Security Operations Center to investigate any suspicious emails. 

What is phishing@dominos.com?

800

This type of software is specifically designed to detect, prevent, and take action to disarm or remove malicious software.

What is Antivirus Software?

800

DAILY DOUBLE! 

This type of authentication involves confirming a user's identity based on unique physical characteristics, such as fingerprints, facial features, or iris patterns.

1000

This technique involves masking or obfuscating data, especially sensitive information, to prevent unauthorized access while still allowing it to be processed or analyzed.

What is anonymization or redaction?

1000

In 2021, this major U.S.-based pipeline operator fell victim to a ransomware attack, leading to temporary shutdowns and fuel shortages along the East Coast.

What is the Colonial Pipeline Ransomware attack?

1000

This practice involves regularly updating email software to protect against newly discovered vulnerabilities.

What is patch management?

1000

This tool monitors and controls incoming and outgoing network traffic based on predetermined security rules to prevent unauthorized access and protect against cyber attacks.

What is a firewall?

1000

This protocol is widely used for secure, federated identity management, allowing users to authenticate with one system and gain access to others without re-entering credentials.

What is SAML?