Cybersecurity Basics
Threat Actors
Threat Models
Real-World Scenarios
Defense & Prevention
100

What is cybersecurity?

The protection of computer systems and networks from attacks or unauthorized access.

100

What is a “threat actor”?

A person or group responsible for carrying out cyberattacks.

100

What is a threat model?

A plan for identifying and preventing possible cyberattacks.

100

Why is cybersecurity important for governments?

To protect national security and infrastructure.

100

What is one basic step everyone can take to protect their online accounts?

Use strong, unique passwords.

200

What are the three core principles of cybersecurity known as the CIA Triad?

Confidentiality, Integrity, and Availability.

200

What do we call hackers who use pre-made tools and have little experience?

Script Kiddies.

200

Name one purpose of threat modeling.

To predict and prepare for potential security threats.

200

Which type of attack can shut down business systems until a ransom is paid?

Ransomware attack.

200

What is encryption used for?

To protect data by converting it into unreadable code.

300

Which type of cyber threat involves tricking people into giving up personal information?

Phishing.

300

Which type of hacker is motivated by political or social causes?

Hacktivist.

300

What are three key components of a threat model?

Adversaries, Assets, and Risk Assessment.

300

What kind of data would a cyberattack on a school target?

Student grades, records, and personal information.

300

What’s the purpose of multi-factor authentication (MFA)?

To add an extra layer of security beyond a password.

400

What is one reason cybersecurity is important for individuals?

To protect personal data like passwords, bank info, and identity.

400

What is the difference between a white hat and black hat hacker?

White hats are ethical hackers; black hats have malicious intent.

400

What does the acronym PASTA stand for?

Process for Attack Simulation and Threat Analysis.

400

What kind of hackers might steal trade secrets from competitors?

Competitor Spies or Industrial Spies.

400

Name one best practice for organizations to reduce risk.

Regular system updates or employee cybersecurity training.

500

Name one example of a real-world cybersecurity breach that affected millions.

Equifax breach, MGM attack, or UnitedHealth ransomware.

500

Which type of threat actor is backed by governments and focuses on espionage?

Nation-State or Advanced Persistent Threat (APT).

500

What does OCTAVE focus on?

Organizational risk and protection of critical assets.

500

If an insider leaks confidential information, what type of threat is this?

Insider Threat.

500

What is the goal of risk management in cybersecurity?

To identify, reduce, and control possible security threats.