This type of encryption uses the same key for both encryption and decryption
What is symmetric encryption?
This type of software monitors and restricts incoming and outgoing network traffic based on security rules.
What is a firewall?
The "C" in the CIA triad stands for this, ensuring that data is only accessible by authorized users.
What is confidentiality?
This term describes a password that contains letters, numbers, and special characters to increase security.
What is a strong password?
This type of attack involves tricking people into giving up sensitive information by pretending to be a trustworthy entity.
What is phishing?
A type of encryption where each letter in the plaintext is shifted by a certain number of places down or up the alphabet.
What is the Caesar cipher?
A security feature that adds an extra layer of protection by requiring a second form of identification beyond just a password.
What is multi-factor authentication (MFA)?
This aspect of the CIA triad ensures that data is accurate and has not been tampered with
What is integrity?
This attack method involves trying every possible combination of characters until the correct password is found.
What is a brute force attack?
This more targeted form of phishing often involves personalized information to increase the attack’s success.
What is spear phishing?
This widely-used encryption protocol secures communication over the internet, particularly with HTTPS.
What is TLS (Transport Layer Security)?
This type of software detects and removes malicious software from your computer.
What is antivirus software?
The "A" in the CIA triad stands for this, ensuring that systems and data are accessible when needed.
What is availability?
A common recommendation for passwords is to use at least this many characters
What is 12 characters?
In this type of phishing attack, the attacker pretends to be a high-ranking official to exploit employees.
What is whaling?
In this process, plaintext is converted into an unreadable format to protect sensitive data.
What is encryption?
A feature that keeps a secure copy of your data so you can restore it if it's lost or corrupted.
What is a backup?
Ensuring that a person is who they claim to be is critical for maintaining this aspect of the CIA triad.
What is confidentiality?
This type of password attack uses a precomputed list of potential passwords to quickly find matches.
What is a dictionary attack?
The term for phishing attempts that occur over text messages.
What is smishing?
This type of encryption uses two keys—one public and one private.
What is asymmetric encryption?
The security principle that suggests users should have the minimum level of access necessary to perform their duties.
What is the principle of least privilege?
This process, often part of the integrity principle, involves confirming that data has not been altered.
What is data validation?
This term refers to the practice of using the same password across multiple sites, increasing risk
What is password reuse?
This type of phishing attack involves creating a fake website that looks like a legitimate one to steal credentials.
What is a phishing website (or spoofing)?