This term refers to protecting computers, networks, and data from digital attacks.
What is cybersecurity?
A strong password should include a mix of these four elements.
What are uppercase letters, lowercase letters, numbers, and symbols?
This term describes software designed to damage or gain unauthorized access to systems.
What is malware?
This type of address identifies a device on a network.
What is an IP address?
Reviewing these settings helps protect your online privacy.
What are privacy settings?
The main goal of cybersecurity is to prevent unauthorized access and this type of loss.
What is data loss?
Reusing passwords is risky because if one account is hacked, this can happen.
What is multiple accounts being compromised?
This type of malware locks files and demands payment.
What is ransomware?
This tool helps block unauthorized network traffic.
What is a firewall?
If your account is hacked, you should immediately change this.
What is your password?
Confidentiality, Integrity, and Availability together form this security model.
What is the CIA Triad?
Logging in using more than one verification method is called this.
What is multi-factor authentication?
Phishing attacks try to trick users into giving away this kind of information.
What is personal or sensitive information?
This protocol is more secure than HTTP because it uses encryption.
What is HTTPS?
Repeated online harassment or intimidation is called this.
What is cyberbullying?
Keeping data private and accessible only to authorized users is called this.
What is confidentiality?
A code sent to your phone is an example of something you have.
What is something you have?
Urgent or threatening language is a common sign of this type of attack.
What is a phishing email?
Public Wi-Fi networks are considered this compared to private networks.
What is less secure?
Software updates are important because they fix these weaknesses.
What are security vulnerabilities?
Ensuring data remains accurate, unchanged, and trustworthy is known as this.
What is integrity?
Face ID is an example of this type of authentication factor.
What is something you are?
Clicking suspicious links can result in malware infections or this.
What is data theft?
Encryption helps protect data while it is being sent across this.
What is a network or the internet?
An ethical hacker legally helps organizations improve this.
What is cybersecurity or security?