What type of malware disguises itself as legitimate software and often spreads through malicious email attachments or downloads?
What is a "Trojan Horse"?
This notorious hacker, known by the alias "Kevin Mitnick," was once on the FBI's Most Wanted list for computer-related crimes. Who is he, and what is he known for?
Who is "Kevin Mitnick," and he is known for hacking into various computer systems and stealing sensitive data, as well as for his social engineering skills?
What term describes the legal principle that requires organizations to inform individuals affected by a data breach or security incident?
What is "Data Breach Notification" or "Data Breach Disclosure"?
In this type of social engineering attack, an attacker poses as a trusted entity to manipulate victims into providing confidential information.
What is "Phishing"?
In 2010, a highly sophisticated computer worm called ____ that targeted a specific type of industrial facility.
What is Stuxnet.
In cybersecurity, what is the primary purpose of a Non-Disclosure Agreement (NDA)?
What is "Protecting Confidential Information" or "Preventing Unauthorized Disclosure"?
What does "DDoS" stand for, where attackers flood a target system or network with traffic to make it unavailable to users?
What is "Distributed Denial of Service"?
In 2020, a cybersecurity breach affected a prominent software company, leading to unauthorized access to its source code. What was the name of the company, and how did this breach impact cybersecurity worldwide?
What is "SolarWinds,".
What is the term for the ethical practice of intentionally probing a computer system or network for vulnerabilities to help improve security?
What is "Ethical Hacking" or "Penetration Testing"?
What is the primary goal of a Distributed Denial of Service (DDoS) attack?
What is "Making a Service or Website Unavailable"?
In 2010, a hacktivist group known for its Anonymous mask symbolized protest against various organizations and governments. What is the name of this group, and what is their symbol?
What is "Anonymous," and their symbol is the Guy Fawkes mask?
In the context of cybersecurity ethics, what is the principle that emphasizes minimizing harm to individuals and organizations while conducting security research or testing?
What is the "Principle of Do No Harm"?
What is the term for the practice of gathering information about a target through social media and other public sources to launch targeted attacks?
What is "OSINT" or "Open Source Intelligence Gathering"?
This hacking collective, founded by Julian Assange, gained international attention for its efforts to expose government and corporate secrets. What is the name of this group, and what is their most well-known platform for publishing leaks?
What is "WikiLeaks," and they are known for publishing leaks on their website?
: What is the legal concept that allows individuals or organizations to protect their intellectual property by preventing others from using, copying, or distributing their creations without permission?
What is "Copyright" or "Intellectual Property Rights"?