Security Foundations
Types of Threats
Security Technology
Data Protection & Privacy
Current Events & Emerging Trends
100

This basic security practice involves keeping your software up-to-date to fix known vulnerabilities.

What is patching?

100

This type of malicious software is designed to disguise itself as legitimate software to trick you into installing it.

What is a Trojan horse?

100

This security tool acts like a gatekeeper, controlling incoming and outgoing network traffic based on predetermined rules.

What is a firewall?

100

This common practice helps protect your online accounts by requiring a code from your phone in addition to your password.

What is two-factor authentication (or multi-factor authentication)

100

This type of attack uses artificial intelligence to create highly convincing fake videos or audio recordings.

What is a deepfake?

200

This principle grants users only the necessary access to perform their job duties.

What is least privilege?

200

This kind of attack floods a system with traffic to make it unavailable to legitimate users.

What is a Denial-of-Service (DoS) attack?

200

This type of software is designed to detect and remove malicious software from your computer.

What is antivirus software?

200

This type of software helps prevent sensitive data, like credit card numbers, from leaving a company's network.

What is Data Loss Prevention (DLP)?

200

This recent cybersecurity incident involved a supply chain compromise, where attackers injected malicious code into widely used software to gain access to numerous organizations' systems.

What is the SolarWinds attack (or Sunburst attack)? 

300

This term refers to the unauthorized viewing, theft, or use of sensitive data.

What is a data breach?  

300

This social engineering tactic uses urgent or threatening language to manipulate victims into revealing sensitive information or making payments.

What is scareware?

300

This process scrambles data to make it unreadable without the proper decryption key.

What is encryption?

300

This Canadian federal law protects personal information collected by private-sector organizations.

What is the Personal Information Protection and Electronic Documents Act (PIPEDA)?

300

This type of security approach assumes that no user or device can be trusted by default and requires verification at every stage.

What is Zero Trust security?

400

This security measure combines something you know (like a password) with something you have (like a phone) for stronger authentication.

What is two-factor authentication (or multi-factor authentication)?

400

This type of attack exploits a vulnerability that is unknown to the software vendor.

What is a zero-day exploit?

400

This system monitors network or system activity for malicious events or policy violations and sends alerts.

What is an Intrusion Detection System (IDS)?

400

This is the process of identifying and evaluating potential security risks to your data and systems.

What is a risk assessment?

400

This type of attack exploits vulnerabilities in the way data is transferred between a website and a user's browser, potentially allowing attackers to steal cookies or manipulate sensitive information.

What is a Man-in-the-Middle (MitM) attack?

500

These three core principles (often abbreviated as CIA) are the foundation of information security.

What are confidentiality, integrity, and availability?

500

This advanced type of malware is often used for espionage and can remain hidden on a system for a long time.

What is an Advanced Persistent Threat (APT)?

500

This security measure uses unique biological traits to verify a person's identity.

What is biometrics?

500

This principle in data security emphasizes collecting only the necessary data and using it only for its intended purpose.

What is data minimization?

500

This advanced persistent threat group, believed to be state-sponsored, has been linked to sophisticated cyberespionage campaigns and the use of the NotPetya malware.

Who is Sandworm (or Telebots, Voodoo Bear)?