Protection of computer systems, networks, and data from digital attacks.
What is cybersecurity?
The network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
What is the Internet of Things?
This is an example of personal information you should NOT use in a username.
What is name/DOB/age?
Using graphs, charts, and images to visualize complex data.
What is data visualization?
This is who holds the legal rights to a work protected by copyright.
What is the creator/owner?
Identity theft, stealing money, stealing private information, controlling private computers.
What is cybercrime?
With the accelerated use of IoT, significant cyber _____ to critical information.
What is risk?
This is something you should do if someone online claims to know you.
What is verify their identity/proceed with caution?
This type of chart is great for showing percentages.
What is a pie chart?
In copyright, this is the creator retaining all rights, and the work cannot be used without permission.
What is all rights reserved?
The purpose of cybersecurity is to ____________ all things related to computers and networks.
What is protect?
Name one purpose of major cyber attacks on critical infrastructure.
What is to cripple society and extort money?
It is considered _______________ when a person is contacting someone repeatedly against their wishes.
What is harassment?
One method for collecting data...
What is surveys?
When a work is in the _________ ___________, the work can be freely used by the public.
One method to prevent cyber attacks is using ___________.
What is firewalls?
With IoT deployments, this is something that is often prioritized over IT cybersecurity.
What is Quick Time-To-Market and launch?
This is the primary difference between data privacy and data security.
What is "Privacy is about data usage, security is about data production"?
What is encrypted/encyrption?
This is a program that pays hackers to report vulnerabilities.
What is a bug bounty program?
Regular software updates is a cybersecurity measure that involves finding and fixing system _________________.
What is vulnerabilities or weaknesses?
How do IoT devices in factories help improve operations?
What is by predicting potential machine malfunctions/problems?
What is all accounts aren't compromised.
This is what happens when a hacker accesses an encrypted database without an encryption key
What is the data appears as gibberish?
Working as a penetration tester is considered _________ hacking.
What is legal?
This is a 3 component, widely accepted security measure that should be guaranteed in every secure system.
What is the CIA Triad?
Name an environmental benefit IoT can provide.
What is helping manage resources responsibly?
This is a verification process with two steps for extra security.
What is two-factor authentification?
The purpose of a ______ ___________ is to store large amounts of data.
What is a data center?
Where did the terms "White Hat" and "Black Hat" come from?
What is early western films?
A student viewing classmates grades represents a breach of ______________.
What is confidentiality?
Name a way that IoT can benefit agriculture.
What is providing real-time data on soil conditions/crop health/etc.?
What is something about a website you can check to verify the secureness of that site?
What is if HTTPS is in the URL?
The reason it is important to have predefined answer choices in a survey.
What is to ensure consistent data?
The maximum prison time for illegal hacking under the Computer Fraud and Abuse Act in the U.S. is _______.
What is 20 years?