A piece of malicious software that can replicate itself and spread to other computers or devices.
What is a computer virus?
In 2020 this pandemic forced organizations to rapidly adopt remote work arrangements and digital technologies, leading to an expansion of the attack surface and increased cybersecurity risks.
What is the COVID-19 pandemic?
This cryptographic technique is used to convert readable data into an unreadable format to ensure confidentiality.
What is encryption?
This type of malware is designed to encrypt files on a victim's computer and demand payment for their release.
What is ransomware?
These 3 core principals confidentially, integrity, and availability are the foundational concepts in information security essential for protecting assets is comprised of this framework.
What is the CIA Triad?
This cybersecurity framework, developed by the National Institute of Standards and Technology (NIST), provides a comprehensive set of guidelines and best practices for improving cybersecurity posture.
What is the NIST Cybersecurity Framework?
This project created by the Advanced Research Projects Agency, of the United States Department of Defense, started researching the feasibility of a networked system of communication to trade information within the United States Armed Forces in 1968.
What is the ARPANET project?
This term refers to the process of converting ciphertext back into its original plaintext form.
What is decryption?
This type of attack involves flooding a network or server with an overwhelming amount of traffic to disrupt normal operation.
What is a Distributed Denial of Service (DDoS) attack?
This security principle ensures that information is only accessible to authorized users and not disclosed to unauthorized parties.
What is confidentiality?
This term describes the unauthorized access or use of computer systems or networks for malicious purposes.
What is hacking?
This man is credited with inventing the Ceasar cipher in 50 B.C.
Who is Julius Caesar?
This type of security control verifies the authenticity of a user's identity based on physical characteristics, such as a smart card or USB token.
What is possession-based authentication?
This type of attack involves tricking individuals into divulging sensitive information such as passwords or financial details.
What is phishing?
This term refers to the practice of ensuring that data is available and accessible to authorized users when needed.
What is data availability?
This principle of information security ensures that individuals are granted only the minimum level of access or permissions necessary to perform their job functions.
What is the principle of least privilege?
This machine was employed by the Germans in World War II to encrypt the data of warfare and was successfully decrypted by Alan Turing.
What is the Enigma Machine?
This authentication method verifies the identity of a user by analyzing unique physical characteristics, such as fingerprints or facial features.
What is biometric authentication?
This type of attack involves intercepting and altering communication between two parties without their knowledge.
What is a man-in-the-middle (MitM) attack?
This term refers to the process of identifying, assessing, and managing security risks to information systems.
What is risk management?
This type of security control prevents unauthorized access to a network by analyzing and monitoring incoming and outgoing traffic.
What is a firewall?
In 1988, this man infected thousands of computers worldwide and was one of the first major internet worm attacks.
Who is Morris Worm?
This protocol is used to establish secure communication over a computer network by encrypting data transmitted between two parties.
What is the Secure Sockets Layer (SSL) or Transport Layer Security (TLS)?
These attacks exploit human psychology and manipulate individuals into divulging sensitive information, performing actions, or bypassing security measures. Examples include pretexting, baiting, tailgating, and impersonation.
What are social engineering attacks?
Donn B. Parker expands on the CIA Triad by adding three more items: authenticity, possession or control, and utility. These six principles in pairs: confidentiality and possession, integrity and authenticity, and availability and utility. These six principles have come to be called ____ ____.
What is the Parkerian Hexad?