This term describes the practice of protecting systems, networks, and programs from digital attacks.
What is cybersecurity?
This type of attack involves an attacker sending fraudulent communications that appear to come from a reputable source.
What is phishing?
This is an update to software that fixes a security vulnerability.
What is a patch?
This 1988 event is considered one of the first major internet worms, created by Robert Tappan Morris.
What is the Morris Worm?
Passwords are typically not stored in plain text. They are stored as ________________.
What are hashes?
This type of software is designed to detect and remove malicious software from a computer.
What is antivirus software?
This type of malware encrypts a victim's files and demands payment to restore access.
What is ransomware?
This principle involves granting users only the access they need to perform their job functions.
What is the principle of least privilege?
This 2017 ransomware attack affected over 200,000 computers across 150 countries, exploiting a vulnerability in Windows. It made users wanna _____.
What is WannaCry?
This kind of engineering is used to trick people into revealing their personal information.
What is social engineering?
This is the process of converting information or data into a code to prevent unauthorized access.
What is encryption?
This term refers to a network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
What is a botnet?
This is a security measure that requires users to provide two forms of identification before accessing an account.
What is two-factor authentication?
This attack on Iran destroyed many of the centrifuges it used in its nuclear weapons program.
What is Stuxnet?
These two colors are included in the names of hackers who hack maliciously and those who hack with the permission of system managers.
What are black and white?
This term refers to the practice of ensuring that data is accurate and reliable.
What is data integrity?
This type of malware disguises itself as legitimate software to trick users into installing it.
What is a Trojan horse?
This type of test involves simulating cyberattacks on a system to identify vulnerabilities.
What is penetration testing?
This person used his access to government records to reveal the extent to which the US government was spying on its citizens. The information he leaked also revealed the identities CIA operatives. He fled to Russia, lives there now, and a movie was made about him.
Who is Eduard Snowdon?
This is the science of hiding information in plain sight, like manipulating the binary of files or images.
What is steganography?
This type of attack involves overwhelming a system with traffic to make it unavailable to users.
What is a Distributed Denial of Service (DDoS) attack?
This term describes a vulnerability that is unknown to those who should be interested in mitigating it.
What is a zero-day exploit?
These are replacements for passwords, used by Google, Amazon, and many other companies.
What are passcodes.
2 resorts in this city were hit by ransomware in 2022. 1 resort paid the ransom and 1 did not and suffered through the consequences.
What is Las Vegas?
This organization is responsible for coordinating the response to cyber incidents affecting the European Union.
What is the European Union Agency for Cybersecurity (ENISA)?