This term describes the practice of protecting systems, networks, and programs from digital attacks.
What is cybersecurity?
This type of attack involves an attacker sending fraudulent communications that appear to come from a reputable source.
What is phishing?
This is an update to software that fixes a security vulnerability.
What is a patch?
A trap to lure hackers
This type of software is designed to detect and remove malicious software from a computer.
What is antivirus software?
This type of malware encrypts a victim's files and demands payment to restore access.
What is ransomware?
If you receive a suspicious email, what steps could you take to make sure that it is a real email?
Check the email address, check for attachments that seem unusual
What is ransom ware _____.
Malware that demands Money
This is the process of converting information or data into a code to prevent unauthorized access.
What is encryption?
What does a hacker or hacking do?
Tries to gain unauthorized access to files
This is a security measure that requires users to provide two forms of identification before accessing an account.
What is two-factor authentication?
What is an example of a good password
Numbers, letters, special characters
Define malware
files to do damage to devices
This type of malware disguises itself as legitimate software to trick users into installing it.
What is a Trojan horse?
What does cybersecurity involve?
Protecting computers, networks and programs from attacks or damages.
What are some recent cybersecurity breaches that you know of
I Ready
United Healthcare
PowerSchool
What is a Firewall?
System to block against malicious traffic
What is Spyware? Where does the information go?
Information sent from your computer to hackers
Different types of malware
Virus, Worms, ransomware
Name one importance of cybersecurity
protecting sensitive data
Maintaining operational continuity