This cybersecurity measure involves regularly updating software and systems to patch vulnerabilities and protect against known malware threats.
What is patch management?
This type of social engineering attack involves a cybercriminal posing as a legitimate entity, often through email, to deceive individuals into revealing sensitive information or performing actions they shouldn't.
What is phishing
This fundamental concept in cryptology involves the process of converting plaintext into ciphertext, making it unreadable to anyone without the proper decryption key.
What is encryption?
This term refers to a previously unknown software vulnerability that is exploited by attackers before the software vendor has a chance to release a patch.
What is a zero-day vulnerability?
This legal term refers to written or printed false statements that harm the reputation of an individual or entity, and it's a common issue in the context of online communication.
What is libel?
This type of malware encrypts a victim's files or systems and demands a ransom for the decryption key.
What is ransomware?
This is a highly targeted phishing attack - aimed at senior executives - masquerading as a legitimate email.
What is whaling?
This type of key in asymmetric encryption is available and is used for encryption, while its corresponding private key is kept secret and used for decryption.
What is the public key?
This term describes the practice of discovering and reporting zero-day vulnerabilities to the affected software vendor, often done by security researchers and ethical hackers.
What is responsible disclosure?
Under the U.S. Computer Fraud and Abuse Act, what term is used to describe the unauthorized access or exceeding authorized access to a computer system?
What is hacking
Released in the early 1970s, this was one of the earliest known computer worms that spread across the ARPANET, displaying a message that read 'I'm the creeper, catch me if you can!'
What is the Creeper worm?
The fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.
What is Smishing?
This type of attack attempts to discover a cryptographic key by trying all possible combinations until the correct one is found.
What is a brute force attack?
This class of vulnerability occurs when a software program runs with higher privileges than necessary, potentially allowing attackers to gain unauthorized access.
What is a privilege escalation vulnerability?
What landmark U.S. legislation, enacted in 2002, requires public companies to implement and maintain effective internal controls for financial reporting, including cybersecurity measures?
What is the Sarbanes-Oxley (SOX) Act?
A group of computers infected with the same type of malware, controlled by a single entity, is often referred to as this term, which is commonly used for conducting coordinated cyber attacks.
What is a botnet?
In social engineering, this term refers to the tactic of building trust and rapport with a target in order to manipulate them into providing confidential information.
What is pretexting?
Widely used for securing internet communications, this cryptographic protocol ensures that data transmitted between a web browser and a website remains confidential and tamper-proof.
What is Transport Layer Security (TLS)?
This widely used Java-based logging library became notorious in late 2021 for a critical vulnerability, allowing attackers to execute arbitrary code remotely, leading to widespread concerns across the cybersecurity community.
What is Log4j?
This European Union regulation, implemented in 2018, imposes strict requirements on how organizations handle and protect personal data.
What is the General Data Protection Regulation (GDPR)?
Considered one of the worst malware outbreaks in history, this worm, which targeted Microsoft Windows systems, spread rapidly in 2003 by exploiting a critical vulnerability, causing massive disruptions worldwide.
What is the Blaster worm (or MSBlast)?
This is the number of social engineering emails that are sent worldwide every single day.
What is 3.4 Billion
This widely used symmetric-key encryption algorithm, known for its efficiency and security, was developed by Belgian cryptographers Vincent Rijmen and Joan Daemen.
What is the Advanced Encryption Standard (AES)?
In 2014, a major security flaw was discovered in the OpenSSL cryptographic software library, exposing sensitive information like usernames and passwords. This vulnerability was dubbed as what?
Enacted in 1986, this U.S. federal law provides privacy protections for electronic communications and regulates the interception and disclosure of wire, oral, and electronic communications
What is the Electronic Communications Privacy Act (ECPA)?