Phishing & Social Engineering
Malware & Attacks
Network Security
Defense & Frameworks
AI in Cybersecurity
100

This term describes a fraudulent email designed to trick the recipient into revealing sensitive information.

What is Phishing?

100

This type of malware encrypts a victim's files and demands payment for the decryption key.

What is Ransomware?

100

A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.

What is a Firewall?

100

The security practice of requiring at least two different forms of identification before granting access.

What is Multi-Factor Authentication (MFA)?

100

his generative AI technology is used by attackers to create highly realistic audio or video of a person to bypass voice biometrics or trick employees into making wire transfers.

What is a Deepfake?

200

Abbreviated as BEC, this type of phishing targets companies to conduct unauthorized transfers of funds.

What is Business Email Compromise?

200

Named after a Greek myth, this malware disguises itself as legitimate software to gain access to a system.

What is a Trojan Horse?

200

This technology creates a secure, encrypted "tunnel" over a public network like the internet.

What is a VPN (Virtual Private Network)?

200

The process of updating software to the latest version to fix security vulnerabilities.

What is Patching?

200

In AI-driven defense, this technique involves establishing a "baseline" of normal user behavior and flagging any activity that deviates from it as a potential threat.

What is Anomaly Detection (or Behavioral Analytics)?

300

This term refers to phishing attacks specifically conducted over voice calls or VoIP.

What is Vishing?

300

An exploit that takes advantage of a software vulnerability that is unknown to the vendor and has no available patch.

What is a Zero-Day?

300

The process where two entities on a network confirm each other's identity and agree on encryption parameters.

What is a Handshake (e.g., TLS Handshake)?

300

A security model based on the principle of "never trust, always verify," regardless of whether the user is inside the network perimeter.

What is Zero Trust?

300

This subfield of machine learning focuses on tricking models by providing them with deceptive input, such as adding invisible "noise" to an image so an AI misclassifies it.

What is Adversarial Machine Learning?

400

A highly targeted phishing attack aimed specifically at senior executives or high-profile individuals.

What is Whaling?

400

A network of infected "zombie" computers controlled by a single attacker to launch massive DDoS attacks.

What is a Botnet?

400

An attack where the perpetrator secretly relays and possibly alters the communications between two parties who believe they are directly communicating.

What is a Man-in-the-Middle (MitM) attack?

400

This group of security professionals is hired to simulate an attack on an organization to test its defenses.

What is a Red Team?

400

A specific attack where a user provides a Large Language Model (LLM) with carefully crafted text designed to ignore its safety filters and original instructions.

What is Prompt Injection (or Jailbreaking)?

500

The social engineering practice of following an authorized person into a secure area without a badge.

What is Tailgating (or Piggybacking)?

500

An Advanced Persistent Threat (APT) actor that remains undetected in a network for an extended period to steal data.

What is a "Sleeper" or APT?

500

This type of scan sends packets to a port without completing the three-way handshake to avoid detection by simple logs.

What is a Stealth Scan (or SYN Scan)?

500

This international standard provides the framework for an Information Security Management System (ISMS).

What is ISO/IEC 27001?

500

An attack that occurs during the AI's development phase, where a malicious actor corrupts the training data to create a "backdoor" or permanent bias in the resulting model.

What is Data Poisoning?