General Information
Cyber Attacks
Media
Authentication
100

Random seemingly unrelated facts, numbers, words, or statistics.

What is a Data?

100

A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information.

What is Phishing?

100

When someone uses another person's PII (personal identifying information) without their permission to commit fraud or other crimes.

What is Identity Theft?

100

An electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence. 

What is Multi Factor Authentication?

200

This ensures that only authorized parties can view information.

What is confidentiality?

200

They are people who try to gain access to computers remotely to learn more and for intellectual curiousity.

Who are Hackers?

200

It may be used to inject keystroke into a system, used to hack a system, steal victims essential and credential data can inject payload to the victim's computers.

What is a rubber ducky?

200

The most common authentication method requiring a username and additional field to log in.

What is Password Authentication?

300

This is another name for unsolicited e-mail messages.

What is spam?

300

Individuals who use hacking with criminal intent.

Who are Crackers?

300

Unwanted software on an internet browser that alters the activity of the browser.

What is a Browser Hijacking?

300

Type of authentication that relies on a finger tip or in futuristic movies an eye scan.

What is Biometrics Authentication?

400

An identifier that uniquely tracks actions to individuals.

What is an Account?

400

Harmful software that seeks to damage or exploit the computer that runs it or installs it.

What is Malware?

400

A cybersecurity attack where the perpetrator installs a Trojan horse on the victim's computer that is capable of modifying that user's web transactions.

What is Man in the Browser?

400

This is a single set of credentials to access multiple applications or websites.  

What is SSO?

500

Private network tunnels through larger network.

What is a VPN?

500

A cyberattack that occurs when you click on a website and a message appears demanding you to pay a certain amount of money to unlock your computer.


What is Ransomware?

500

Malicious extensions that redirect users to phishing sites.

What is Spyware?

500

This type of authentication enables users to log in to accounts using a physical device, such as a smartphone, security key or smart card.


What is Token Authentication?