The fundamental security triad consisting of Confidentiality, Integrity, and this third component.
What is Availability?
This security measure acts as a barrier between a trusted network and an untrusted network.
What is a Firewall?
This type of software is designed to block access to a computer system until a sum of money is paid.
What is Ransomware?
A private network that allows secure, remote access to an organization's internal resources.
What is a VPN (Virtual Private Network)?
This type of phishing is specifically targeted at high-level executives within an organization.
What is Whaling?(or BEC - Business Email Compromise)
This type of software is designed to detect, prevent, and take action against malicious software.
What is Anti-malware/Antivirus?
An attack that uses deception to trick individuals into revealing sensitive information.
What is Social Engineering?
The process of verifying the identity of a user or system.
What is Authentication?
This framework, developed by a US government agency, provides guidelines for organizations to manage and reduce cybersecurity risk.
What is the NIST Framework?
A simulated cyberattack against your computer system to check for exploitable vulnerabilities.
What is a Penetration Test? (Pen Test)
A type of malware that self-replicates and spreads across networks without human interaction.
What is a Worm?
A mechanism that allows a user to log in once and gain access to multiple systems.
What is SSO (Single Sign-On)?
A security process requiring more than one method of authentication from independent categories of credentials.
What is MFA (Multi-Factor Authentication)?
This system monitors network traffic for suspicious activity and issues alerts.
What is an IDS (Intrusion Detection System)?
An attack that exploits a vulnerability before it is known to the software vendor.
What is a Zero-Day Attack?
The principle of restricting user access rights to only what is necessary for their job.
What is PoLP (Principle of Least Privilege)?
This protocol is used to provide secure communication over a computer network, widely used for secure web browsing.
What is TLS (Transport Layer Security)?
A security strategy that uses multiple layers of defense to protect data.
What is Defense in Depth?
The abbreviation for Personally Identifiable Information, which must be protected from breaches.
Answer: What is PII?
This standard ensures that all companies that accept, process, store, or transmit credit card information maintain a secure environment.
What is PCI DSS?