Social Engineering
Triple A
CIA Triad
Cybersecurity Threats
Attack Prevention
100

This common social engineering tactic involves tricking individuals into revealing personal information through fake emails or messages.

  • What is phishing?

 

100

This is the process of confirming a user’s identity before granting access.

What is authentication?  

100

This principle ensures that sensitive information is protected from unauthorized access.

What is confidentiality?

100

This is a malicious software program designed to damage or disrupt a system.

What is malware?

100

This security method scrambles data so it can only be read by authorized parties.

What is encryption?

200

A scammer posing as IT support to gain access to your account is an example of this technique.

What is pretexting?

200

This ensures a user only has access to resources they are permitted to use.

 What is authorization? or Principle of least privilege

200

This principle ensures that data remains accurate and unaltered.

What is integrity?

200

A denial-of-service (DoS) attack targets this aspect of the CIA Triad.

What is availability?

200

Using strong passwords and changing them regularly helps prevent this type of attack.

What is password cracking?, Brute force, Dictionary attacks..

300

This is the term for when attackers call someone pretending to be a trusted authority to extract sensitive information.

Answer: What is vishing (voice phishing)?

300

This refers to tracking user activity and maintaining logs for accountability.

What is accounting?

300

This principle ensures that systems and data are available when needed.

What is availability?

300

This type of attack involves guessing or cracking passwords to gain access to a system.

What is brute force?

300

Installing and regularly updating this software helps protect against malware.

What is antivirus software?

400

This term describes an attacker following someone into a secure building without proper credentials.

What is tailgating (or piggybacking)?

400

This form of authentication requires two or more verification factors, such as a password and a fingerprint.

What is multi-factor authentication (MFA)?

400

The encryption of sensitive files is a method of maintaining this aspect of the CIA Triad.

  • What is confidentiality?

400

This type of malware disguises itself as legitimate software but performs malicious actions.

  • What is a Trojan horse?

400

Restricting access based on user roles is an example of this security model.

What is role-based access control (RBAC)?

500

This advanced social engineering attack uses a legitimate-looking website to steal usernames and passwords.

What is a spoofed site or phishing site?

500

his type of accounting tracks access by recording who accessed what, when, and how.

What is audit logging?

500

A ransomware attack can compromise all three aspects of this model.

  • What is the CIA Triad?

500

An attack that intercepts and modifies communication between two parties is known as this.

What is a man-in-the-middle (MITM) attack?

500

This type of testing identifies vulnerabilities in a system before attackers can exploit them.

What is penetration testing?