Preventing unauthorized access to data, such as using encryption, falls under this part of the CIA Triad.
What is Confidentiality?
Sending fraudulent emails that appear to come from a legitimate source to steal data.
What is Phishing?
Software designed specifically to disrupt, damage, or gain unauthorized access to a system.
What is Malware?
Physical objects embedded with sensors and software that connect and exchange data over the internet.
What is the Internet of Things (IoT)?
The capability of a computer system to perform tasks typically associated with human intelligence, like reasoning.
What is Artificial Intelligence?
A DDoS (Distributed Denial of Service) attack that crashes a website primarily violates this CIA principle.
What is Availability?
Looking over someone's shoulder to see them type their password or PIN.
What is Shoulder Surfing?
A specific type of malware that encrypts your files and demands payment to restore access.
What is Ransomware?
This technology creates a fully immersive digital environment, completely shutting out the physical world.
What is Virtual Reality (VR)?
The field of AI that enables computers to interpret and understand visual information.
What is Computer Vision?
Entering a PIN or Password is an example of this type of authentication. Something you ____.
What is Something you know?
Searching through trash to find confidential information, like bills or notes.
What is Dumpster Diving?
This type of malware disguises itself as a legitimate program (like a game) but contains malicious code.
What is a Trojan?
Delivering computing services (servers, storage, databases) over the internet on a pay-as-you-go basis.
What is Cloud Computing?
A system trained on vast amounts of text to understand and generate human language (like GPT).
What is a Large Language Model (LLM)?
Using a fingerprint scanner or FaceID is an example of this authentication factor. Something you ____.
What is Something you are?
Following an authorized person through a secure door without providing your own credentials.
What is Piggybacking?
Malware that self-replicates and spreads across a network without needing a host file.
What is a Worm?
A decentralized, public ledger of transactions shared across a peer-to-peer network.
What is Blockchain?
Which type of attack involves rapidly testing all possible combinations of characters to guess a password?
What is a Brute Force attack?
Which element of the CIA Triad ensures that data is not modified or tampered with by unauthorized people?
What is Integrity?
A social engineering attack conducted specifically over the phone (voice).
What is Vishing?
Software that secretly collects user data (like browsing history) without their consent.
What is Spyware?
Processing data closer to where it is created (like on a smart thermostat) rather than sending it all to a central server.
What is Edge Computing?
A type of computing that uses "qubits" and can represent both 0 and 1 at the same time.
What is Quantum Computing?