The month which an annual campaign to raise awareness about the importance of cybersecurity is held
What is October?
otitsrrer aactkt
What is terrorist attack?
This attack is often introduced to a system through email attachments, software downloads, or operating system vulnerabilities.
What is Malware?
This document is a set of written instructions for detecting, responding to, and limiting the effects of an information security event
What is an Incident Response Plan?
This federal government agency's "Get Transcript" system was hacked and over 700,000 taxpayers personal information was compromised
What is Internal Revenue Service (IRS)?
The email address that you should forward any and all suspicious emails to
what is phishing@upwork.com?
ecyber tyeurics
What is cyber security?
This attack typically directs users to visit a website where they are asked to updated personal information, such as passwords or credit cards.
What is a Phishing Attack?
This is the collection, analysis, and escalation of incidents and warnings to detect and respond to security threats.
What is Security Monitoring?
This web services provider was forced to admit that the personal data of 500 million users had been compromised in a hack dating back to 2014
What is Yahoo!?
This is any data the could potentially identify a specific individual
What is Personally Identifiable Information (PII)?
vrybiunleaitl
What is vulnerability?
This attack makes use of malicious code, disguised as legitimate software, to perform some malicious task on a host system after being executed by the user
What is Trojan Horse?
This software is designed to prevent worms and Trojan horses from accessing a computer. Also, the software removes any malicious code that has already infected a computer.
What is Virus Protection Software?
A malware attack on this retail company exposed the credit and debit card information of 40 million customers who shopped in stores from November - December 2013, this was one of the largest hacks in U.S. retail history
What is was Target?
These beings are commonly considered to be the weakest components in any security system
What are Human Beings?
scesac ntcrloo
What is access control?
By intercepting the endpoints in an online information exchange (i.e the connection from your smartphone to a website), this attack can obtain information from the end-user and the entity he or she is communicating with
What is Man in the Middle attack?
This technology allows users to log in with a single ID and password to gain access to multiple related, but independent software systems or applications
What is Single sign-on?
In February - March of 2014, this global commerce leader requested that 145 million users change their account passwords due to a breach that compromised encrypted passwords. In this breach hackers gained access to accounts through stolen login credentials.
What is eBay?
This term is defined as "the posture taken to protect people, assets, data, and technology across an entire enterprise"
What is Security?
retiycsu eanswsrae
What is security awareness?
This attack is performed by entering code into an input field with the intention of gaining access to sensitive data from a database
What is SQL Injection?
Mathematical calculations and algorithmic schemes that transform plaintext into cyphertext, a form of text that is non-readable to unauthorized parties
What Is Data Encryption?
In February 2015 hackers stole up to 80 million records from this healthcare provider through phishing emails sent to employees who were tricked into downloading a Trojan which enabled the attackers to obtain passwords for accessing unencrypted data
What is Anthem?