This CIA principle ensures only authorized individuals have access to information.
What is Confidentiality
This type of hacker is motivated by financial gain.
What is a Cybercriminal
SIEM solutions are used to aggregate and analyze this type of data.
What are Security Logs
This access control method assigns permissions based on job roles.
What is Role-based Access Control (RBAC)
AES is a popular encryption standard that falls under this category.
What is Symmetric Encryption
This principle ensures information is accurate and unaltered.
What is Integrity
These hackers, sometimes referred to as Advanced Persistent Threats (APTs), engage in cyber espionage, sabotage, and warfare to serve their interests.
What is a Nation-State Hacker
This team proactively tests an organization's security by simulating attacks.
What is a Red Team
The principle of granting only necessary permissions is known as this.
What is Least Priviledge
This cryptographic hashing algorithm is widely used for integrity verification.
What is SHA-256
This principle ensures systems remain functional for users when needed.
This threat actor has minimal technical skills and relies on pre-made attack scripts.
What is a Script Kiddie
The practice of securing endpoints like laptops and mobile devices.
What is Endpoint Security
The security model that assigns access using security labels.
What is Mandatory Access Control (MAC)
Public and private keys are a feature of this encryption type.
What is Asymmetric Encryption
A cyberattack that modifies data improperly violates this CIA principle.
What is Integrity
A disgruntled employee leaking company data is known as this.
What is an Insider Threat
This protocol encrypts remote login sessions.
What is Secure Shell (SSH)
This authentication method requires multiple factors such as passwords and biometrics.
What is Multi-Factor Authentication (MFA)
TLS and SSL are protocols that secure this time of data exchange.
What is Web Traffic
This security measure helps preserve confidentiality by encrypting data.
What is encryption
Hackers motivated by social or political causes fall under this category.
What is a Hacktivist
This security concept ensures critical systems remain operational even after a failure.
What is Business Continuity
This concept prevents any single individual from having too much control over security process.
What is Separation of Duties
This cryptographic technique ensures non-repudiation of digital messages.
What is Digital Signatures