Cybersecurity is the practice of protecting your computer, network, and __________.
data
Protecting computers, networks, and data from attacks, damage, or unauthorized access.
Cybersecurity
What does the C in the CIA triad
Confidentiality
An "umbrella" term for any malicious software designed to cause damage.
malware
A security process that requires two distinct forms of identification.
2 Factor Authentication (2FA) or Multifactor Authentication (MFA)
Hackers want _______, access, identity, and control.
wealth
Monitors and filters network traffic.
firewall
A retail website (like Amazon) staying online during Black Friday is an example of which pillar of the CIA Triad working properly.
Availability
Which type of malware does NOT self replicate?
Trojan
Using unique physical characteristics, like a thumbprint, to verify identity.
biometrics
What is it called when hacking the human brain?
Social Engineering
Expert hired to find database weaknesses
ethical hacker
What are three parts of the CIA Triad
Confidentiality, Integrity, Availability
Which Malware needs a host file to spread?
Virus
A secure, encrypted location where a password manager stores your login information.
vault
What are fake emails or texts designed to lure you into clicking a link.
phishing
Computer files locked for $100 payment
Ransomware
An online banking system showing your correct balance is an example of which pillar of the CIA Triad working properly.
Integrity
Which malware does not require human help?
Worm
Everything on the internet is broken down into tiny pieces called _________.
packets
What is the "unlocked front door" of the internet?
weak passwords
Converting information into coded form so only authorized users can read it.
encryption
A hacker steals student Social Security numbers from the school database is an example of which pillar of the CIA Triad NOT working properly.
Confidentiality
Which malware uses social engineering to trick users into downloading it.
Trojan
A Network ____________ creates firewall rules.
Administrator