What is malware?
Malicious software designed to damage, disrupt, or gain unauthorized access to a system.
Why use strong passwords?
To prevent attackers from guessing or cracking your login using brute-force or dictionary attacks.
Role of a security analyst?
Monitors systems for security breaches, investigates incidents, and implements protections.
First computer virus?
Creeper virus (1971), spread via ARPANET.
What is "cyber hygiene"?
Regular habits and practices that ensure safe and secure use of technology.
Define phishing.
A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity, usually via email.
What is two-factor authentication?
A login method that uses two different types of verification: something you know (password) and something you have (phone or token).
What does a penetration tester do?
Ethically hacks into systems to find and fix vulnerabilities before real hackers exploit them.
What was the Morris Worm?
One of the first worms on the internet (1988), it caused widespread disruption unintentionally.
Meaning of "white hat" hacker?
A good hacker who uses their skills to protect systems and find security flaws.
Name a type of ransomware.
WannaCry (Other valid answers: Petya, Locky, Ryuk)
Importance of software updates?
They patch security flaws, fix bugs, and improve defenses against new threats.
Define ethical hacker.
A cybersecurity expert who legally breaks into systems to improve their security.
Significance of the Target data breach?
In 2013, 40 million credit cards were stolen due to a third-party vendor’s compromise.
Define "pharming."
Redirecting users from a real website to a fake one to steal information.
What is a DDoS attack?
A Distributed Denial of Service attack overwhelms a server or network with traffic to make it unavailable.
Define VPN.
A Virtual Private Network encrypts your internet connection and hides your IP address for privacy.
What is a CISO?
Chief Information Security Officer—an executive responsible for a company’s information security.
What happened during the WannaCry attack?
In 2017, ransomware infected over 200,000 computers in 150 countries, exploiting a Windows flaw.
What is "spear phishing"?
A targeted phishing attack aimed at specific individuals or organizations.
xplain a zero-day exploit.
A cyberattack that targets a software vulnerability unknown to the vendor, with no patch available yet.
What is encryption?
The process of converting data into unreadable code to prevent unauthorized access.
Responsibilities of a network administrator?
Manages, configures, and secures network infrastructure, ensuring smooth and safe data flow.
Impact of the SolarWinds hack?
A major supply chain attack in 2020 that compromised U.S. government agencies and private companies.
Explain "zero trust" security model.
A model where no user or device is trusted by default—verification is required at all times.