What type of identity theft involves someone using another person's identity to receive medical services?
Medical Identity Theft
What type of malware encrypts a user's data and demands payment to release it?
Ransomware
What feature adds an additional layer of security beyond a password?
Two-Factor Authentication
What cybersecurity tool monitors and controls incoming and outgoing network traffic based on predetermined security rules?
Firewall
This identity theft occurs when someone's personal details are used to commit crimes without their knowledge.
Criminal Identity Theft
This popular cyber threat involves sending fraudulent emails to extract personal information.
Phishing
Regularly updating this software can protect against new viruses and cyber threats.
Antivirus Software
What term describes the theft of credit card information used at legitimate points of sale, typically through a device installed secretly on the machine?
Skimming
What process protects data by converting it into unreadable code that can only be reverted to a readable form with the correct decryption key?
Encryption
This involves combining real and fake information to create a new identity.
Synthetic Identity Theft
What is the term for software specifically designed to damage or disrupt a computer system?
Malware
What Groups are primarily vulnerable to identity theft and cyber attacks?
Elderly individuals, children/teenagers, Financial institutions, Healthcare organizations are susceptible and prone to attacks.
his type of theft targets children's Social Security numbers due to their clean credit history.
Child Identity Theft
What kind of cyber attack spreads by copying itself into other executable code or documents?
virus
This form of identity theft involves using someone else's personal information to illegally commit a crime?
Identity Cloning
This is a security measure that verifies a user’s identity by requiring multiple credentials.
Multi-factor authentication