An attack that targets a specific individual using personalized messaging.
What is Spear Phishing?
Enabling this security feature can add extra layer to prevent unauthorized access to your smartphone or computer.
What is Multiple-Factor Authentication
This type of malware is designed to secretly monitor and steal sensitive information from a computer or network.
What is a Spyware
Any Data that can potentially identify a specific individual.
What is personal identifiable information?
The first thing you should do if you suspect a cyber incident.
What is "report it to IT or cybersecurity team"?
When a cybercriminal pretends to be a trustworthy entity to deceive individuals or companies into revealing sensitive information, it's called this. What is it?
What is social engineering?
What term describes the practice of using a unique combination of characters to access an account, increasing security?
What is a strong password
What type of malware encrypts a user's files and demands a ransom for their release?
What is a Ransomeware
The body responsible for overseeing data protection compliance.
What is NDPC?
This term describes unauthorized access to or theft of sensitive data.
What is a data breach?
This scam uses fake requests from executives to trick staff into transferring money. What is it?
What is business email compromise (BEC)?
This practice involves regularly updating software and systems to protect against known vulnerabilities. What is it?
What is Patching
A self-replicating program that spreads throughout a network and can cause significant damage is called this. What is it?
What is a worm?
What acronym stands for a set of security practices that ensures data privacy, integrity, and availability?
What is CIA (Confidentiality, Integrity, Availability)
These malicious links may look harmless but lead to compromised websites.
What are phishing links?
What term describes the practice of searching through trash for sensitive information, often used by hackers?
What is Dumpster diving
This technology is used to create a secure and encrypted connection over a less secure network, such as the internet.
What is VPN?
Malware that disguises itself as legitimate software but performs malicious actions is known as this.
What is Trojan Horse?
Data must be collected and used only for its intended reason.
What is Purpose Limitation?
This document defines team member roles, incident categories, and reporting procedures for security incidents.
What is an incident response plan?
This AI technology can create fake voices and videos. What is it?
What is a deepfake?
AI can generate this type of harmful software that evolves to avoid detection. What is it?
What is Malware?
This type of malware often attaches itself to legitimate software and spreads when the software is installed. What is it?
What is a virus?
This principle means only necessary data should be collected.
What is data minimization?
This is a cyberattack that overwhelms systems with traffic, making them unavailable.
What is a DDoS (Distributed Denial of Service) attack?