A self-replicating program that spreads without user action
What is a worm
Hardware or software that filters incoming and outgoing traffic based on rules
What is a firewall
Authentication factor based on something you are
What is biometrics
The stage where security teams work to limit the spread or impact of an incident
What is containment
Malicious use of AI to create realistic fake audio, images, or video
What are deepfakes
Malicious code hidden inside a legitimate program
What is a trojan horse
Technology that creates an encrypted tunnel between a user and a network
What is a VPN
Combining two or more authentication methods for stronger protection
What is multi-factor authentication (MFA)
The first step in the incident response process, focused on detecting and reporting issues
What is identification
The massive expansion of connected devices has created new risks in this technology area
What is the Internet of Things (IoT)
Software that secretly monitors and collects user activity
What is spyware
A system that monitors network traffic for suspicious activity and raises alerts
What is an Intrusion Detection System (IDS)
The process of verifying that a user is who they claim to be
What is authentication
A documented, step by step guide that outlines how an organization should handle incidents
What is an Incident Response Plan (IRP)
The new wireless standard that increases bandwidth but also expands the attack surface
What is 5G
This type of attack tricks people into revealing sensitive information
What is phishing
The protocol used to assign IP addresses dynamically on a network
What is DHCP
An access mechanism where one set of credentials works across multiple systems
What is Single Sign-On (SSO)
The process of restoring systems, data, and business operations after an incident
What is recovery
A large-scale coordinated attack where multiple devices flood a network with traffic
What is a Distributed Denial of Service (DDoS)
Malicious code injected into a website's input field to steal or manipulate data
What is SQL injection
A security device that both monitors and actively blocks suspicious network traffic
What is an Intrusion Prevention System (IPS)
Assigning access based on groups of similar job functions
What is Role-Based Access Control (RBAC)
The practice of continuously recording system activity for investigation
What is logging and monitoring
A new trend where criminals use AI chatbots to generate realistic phishing emails
What is AI-powered phishing