Cyber Threats
Cybersecurity Best Practices
Malware
Data Privacy
Cybersecurity Incidents
100

An attack that targets a specific individual using personalized messaging.

What is Spear Phishing?

100

Enabling this security feature can add extra layer to prevent unauthorized access to your smartphone or computer.

What is Multiple-Factor Authentication

100

This type of malware is designed to secretly monitor and steal sensitive information from a computer or network. 

What is a Spyware

100

Any Data that can potentially identify a specific individual.

What is personal identifiable information?

100

The first thing you should do if you suspect a cyber incident.

What is "report it to IT or cybersecurity team"?

200

When a cybercriminal pretends to be a trustworthy entity to deceive individuals or companies into revealing sensitive information, it's called this. What is it?

What is social engineering?

200

What term describes the practice of using a unique combination of characters to access an account, increasing security?

What is a strong password

200

What type of malware encrypts a user's files and demands a ransom for their release? 

What is a Ransomeware

200

The body responsible for overseeing data protection compliance.

What is NDPC?

200

This term describes unauthorized access to or theft of sensitive data.

What is a data breach?

300

This scam uses fake requests from executives to trick staff into transferring money. What is it?

What is business email compromise (BEC)?

300

This practice involves regularly updating software and systems to protect against known vulnerabilities. What is it?

What is Patching

300

A self-replicating program that spreads throughout a network and can cause significant damage is called this. What is it?

What is a worm?

300

What acronym stands for a set of security practices that ensures data privacy, integrity, and availability?

What is CIA (Confidentiality, Integrity, Availability) 

300

These malicious links may look harmless but lead to compromised websites.

What are phishing links?

400

What term describes the practice of searching through trash for sensitive information, often used by hackers?

What is Dumpster diving

400

This technology is used to create a secure and encrypted connection over a less secure network, such as the internet. 

What is VPN?

400

Malware that disguises itself as legitimate software but performs malicious actions is known as this.

What is Trojan Horse?

400

Data must be collected and used only for its intended reason.

What is Purpose Limitation?

400

This document defines team member roles, incident categories, and reporting procedures for security incidents. 

What is an incident response plan?

500

This AI technology can create fake voices and videos. What is it?

What is a deepfake?

500

AI can generate this type of harmful software that evolves to avoid detection. What is it?

What is Malware?

500

This type of malware often attaches itself to legitimate software and spreads when the software is installed. What is it?

What is a virus?

500

This principle means only necessary data should be collected.

What is data minimization?

500

This is a cyberattack that overwhelms systems with traffic, making them unavailable.

What is a DDoS (Distributed Denial of Service) attack?