Communication Tech
Inclusivity
Threats to Data
Data Protection & Testing
100

A network created spontaneously between devices without a central router (e.g., Bluetooth or Wi-Fi Direct).

What is an Ad Hoc network?

100

Software that reads on-screen text aloud for users with visual impairments.

What is a Screen Reader?

100

A form of social engineering where attackers send fake emails to trick users into revealing passwords.

What is Phishing?

100

The process of making a device more secure by closing unused ports, removing unnecessary software, and updating BIOS settings.

What is Device Hardening?

200

This term describes the difference in internet speed and reliability between urban areas with fiber-optic and remote areas relying on copper or satellite.

What is the Digital Divide (or Infrastructure performance issues)?

200

These fonts are often preferred for digital interfaces because they lack "decorative tails," making them easier to read on low-resolution screens.

What are Sans Serif fonts?

200

An employee accidentally emailing a spreadsheet of customer addresses to the wrong person is this type of threat.

What is Unintentional Disclosure (Internal Threat)?

200

This protects data while it is moving across a network (e.g., HTTPS), whereas "At Rest" encryption protects data on a hard drive.

What is Encryption in Transit?

300

These are the two main risks of using unencrypted public hotspots, allowing hackers to intercept data packets.

What are Eavesdropping and Man-in-the-Middle attacks?

300

An inclusivity policy that allows employees to work around personal commitments, often improving staff retention for those with disabilities or childcare needs.

What are Flexible Working Hours?

300

This type of malware encrypts a user's files and demands payment to unlock them.

What is Ransomware?

300

These individuals are hired by companies to legally find vulnerabilities in their systems to improve security.

What are Ethical Hackers (White Hats)?

400

Using a mobile phone as a personal hotspot; it often suffers from high latency and data caps.

What is Tethering?

400

Using Alt-Text, simplified navigation, and high-contrast color schemes helps users with these specific types of needs.

What are Accessibility / Universal Design requirements?

400

A "Rogue Employee" or a lost flash drive represents this specific category of risk that originates from inside the organization.

What are Internal Threats?

400

A simulated cyberattack against your computer system to check for exploitable vulnerabilities.

What is a Penetration Test?

500

This is the primary reason a rural business using an ad hoc network for syncing data faces higher latency and lower reliability compared to an urban business using fixed infrastructure.

What is the Digital Divide (or lack of physical infrastructure like fiber/masts in remote areas)?

500

When designing for a screen reader, this element of Interface Design ensures that the software reads information in a logical, top-to-bottom sequence rather than jumping randomly around the page.

What is a Linear Layout (or Heading Hierarchy)?

500

This specific security breach occurs when a Black Hat hacker leaves a malware-infected USB device in a public area, hoping an employee's "curiosity" leads to an internal system compromise.

What is a Social Engineering attack (combining External and Internal threats)?

500

This type of hacker occupies a "moral middle ground," as they often find system vulnerabilities without prior permission but do not have the malicious intent to steal or destroy data.

What is a Grey Hat Hacker?