What is the process of converting data into a code to prevent unauthorized access?
Encryption
What is the name of an attack where an attacker sends fake emails to steal personal information?
Phishing
Those who have the intent to steal money and data.
Cybercriminals
What term describes the practice of verifying the identity of a user or system?
Authentication
What type of attack involves overwhelming a system with traffic to make it unavailable?
Denial-of-Service (DoS) attack
Internal employees or those who have access to data.
Insiders
What security system monitors and controls incoming and outgoing network traffic?
Firewall
What attack involves an attacker secretly relaying and possibly altering communication between two parties?
Man-in-the-Middle (MITM) attack
In order to gather intelligence, this cohort may steal data.
Nation States or Corporations
Name a software that detects and removes malicious software from a computer.
Antivirus software
Name a type of malware that encrypts data and demands a ransom for its release.
Ransomware
Hacking the system to threat or in some instance whistle-blowers to highlight an issue.
Hackers
What is the term for a flaw, bug, or misconfiguration in a system that can be exploited?
Vulnerability
What term describes the manipulation of someone into giving up personal information?
Social engineering
Kids who are interested in learning how to hack, trial things out.
Script Kiddies