Basic Terms
Types of Malware
Network Security
Cyber Attacks
Famous Hacks
100

This term describes the practice of protecting systems, networks, and programs from digital attacks.

cybersecurity

100

This type of malware is designed to replicate itself and spread to other devices.

Virus

100

This device connects multiple devices in a network and directs data traffic

router

100

This type of attack involves sending fraudulent emails to trick users into revealing sensitive information.

phishing

100

This major retail chain suffered a massive data breach in 2013, compromising millions of customers' credit card information.

Target

200

This is a set of rules for exchanging data between devices.

protocol

200

A type of malware that encrypts the victim's data and demands payment for the decryption key.

ransomware

200

A network segment isolated to protect a network from external threats

DMZ (Demilitarized Zone)

200

An attack where a threat actor impersonates another device or user.

spoofing

200

In 2014, this entertainment company's internal data was breached and leaked, leading to significant controversy.

Sony Pictures

300

A software that monitors and analyzes network traffic for potential threats

Intrusion Detection System (IDS)

300

This malware disguises itself as legitimate software

Trojan horse

300

The act of disguising data to protect its confidentiality.

encryption

300

The act of obtaining unauthorized access to a computer system.

hacking

300

In 2017, this global ransomware attack affected thousands of organizations worldwide, including the UK's National Health Service.

WannaCry

400

This type of software is used to manage the login and access rights of users within a network.

Access Control System

400

A program that records every keystroke made by a user

keylogger

400

A type of attack where the perpetrator sends a flood of data packets to overwhelm a network.

DDoS attack (Distributed Denial of Service)

400

An attack that exploits a software vulnerability to take control of a computer system

exploit

400

In 2018, this social media giant experienced a breach that exposed the personal data of millions of users

Facebook

500

This is a sequence of characters used to verify the identity of a user

Password
500

Malware that provides unauthorized access to a user's system

Backdoor

500

A security measure that filters incoming and outgoing network traffic

Firewall

500

A type of attack where the attacker secretly intercepts communication between two parties.

man in the middle

500

This infamous hacking group was responsible for a series of high-profile attacks, including the 2014 Sony Pictures hack.

Lazarus Group