Cyber Threats
Security Measures
Cyber Threats 2
Network Security
100

This type of cyber threat involves unauthorized access to a computer or network.

What is hacking?

100

What is the term for the process of verifying a user's identity?

What is authentication?

100

This type of malware encrypts a victim’s files and demands payment for the decryption key.


What is ransomware?

100

What is the first line of defense against unauthorized access to a network?

What is a firewall?

200

The following are examples of what: Trojan, virus, bugs

What are Malware?

200

Enabling this feature on your smartphone helps protect it from unauthorized access. HINT It is unique to every individual

What is biometric authentication?

200

This type of malware attaches itself to legitimate programs and spreads when the programs are run.


What is a virus?

200

A secret word or phrase used to get into a PC or network.

What is a password?

300

overwhelms a computer network causing it to slow down

What is a DOS 

300

VPN stands for what, which creates a secure connection over the internet?

What is Virtual Private Network?

300

This type of malware program looks harmless but gives hackers backdoor access to your system once installed.

What is a Trojan horse (or simply Trojan)?

300

This kind of code scrambles your information so hackers can’t read it, only can decrypt it

What is encryption?

400

This type of cyber attack involves exploiting vulnerabilities in a system to gain unauthorized access or steal data.

What is exploitation?

400

What does a UTM appliance typically combine to provide comprehensive security for a network?

What is firewall, antivirus, intrusion detection, and content filtering?

400

This form of deception tricks users into giving up sensitive information by posing as a trustworthy entity in electronic communication.

What is a Phishing?

400

Software that helps find and remove harmful programs and malwares on your computer.

What is antivirus software?

500

This kind of malicious software secretly monitors/ spy on a user's activities and sends information back to a third party.

What is a spyware?

500

What is the term for the practice of hiding sensitive information within less sensitive information?

What is steganography?

500

This term describes unsolicited, malicious, unnecessary  emails sent in bulk to flood a persons email.  

What is spam?

500

This is the term for a backup online where you can store copies of important files in case something bad happens.

What is the cloud?