This pillar of the CIA triad ensures that data is only accessible to authorized users.
What is Confidentiality?
These are the three primary categories of authentication factors: Knowledge, Possession, and what?
What is Inherence (Something you are)?
This "wall" of software or hardware sits between a private network and the internet to filter traffic.
What is a Firewall?
This type of attack overwhelms a system with traffic from multiple sources to take it offline.
What is DDoS (Distributed Denial-of-Service)?
This 3-letter acronym stands for the three fundamental pillars of info security.
What is CIA (Confidentiality, Integrity, Availability)?
This state of information refers to data being sent across a network.
What is Transmission?
This type of encryption, often abbreviated as FDE, protects all data on a device’s storage if it's lost or stolen.
What is FDE (Full Disk Encryption)?
This protocol automatically assigns IP addresses to devices on a network.
What is DHCP (Dynamic Host Configuration Protocol)?
In this attack, a hacker secretly intercepts and alters communication between two parties.
What is MiTM (Man-in-the-Middle) Attack?
This acronym refers to a hardware identifier that is unique to every network device.
What is MAC (Media Access Control) address?
This is the "brain" of the computer that performs calculations and runs instructions.
What is the CPU (Central Processing Unit)?
This modern replacement for BIOS provides more features and better security during the boot process.
What is UEFI (Unified Extensible Firmware Interface)?
This security tool monitors for suspicious activity and sends alerts but doesn't necessarily block it.
What is IDS (Intrusion Detection System)?
This specific attack involves inserting malicious code into input fields to manipulate a database.
What is SQLi (SQL Injection )?
This 3-letter acronym represents the language used to manage and manipulate relational databases
What is SQL (Structured Query Language)?
Information is categorized into three states: stored, transmission, and this third state.
What is Processing?
This type of hacker is considered "ethical" and uses their skills for defensive purposes.
What is White Hat?
This standard technology establishes an encrypted link between a web server and a browser.
What is TLS (Transport Layer Security)?
This term describes a long-term, targeted attack that remains undetected while stealing data.
What is APT (Advanced Persistent Threat) ?
This acronym describes a centralized unit responsible for monitoring and defending an organization.
What is SOC (Security Operation Center)?
These two types of number systems are commonly used to represent computer information.
What is Binary & Hexadecimal (or Decimal)?
This specific virus was mentioned in Unit 5 as a research topic regarding application vulnerabilities.
What is KadNap?
This 32-bit address is divided into a network segment and a host segment by a subnet mask.
What is IPV4?
These two real-life attacks (starting with S and D) use cyber tools to target individuals physically.
What is Swatting and Doxing?
This term refers to the amount of heat a CPU or GPU is expected to produce under load.
What is TDP (Thermal Design Power)?