This act, enacted in 1996, aims to protect the privacy of individuals' medical records.
What is HIPAA (Health Insurance Portability and Accountability Act)?
This 1999 movie features a hacker discovering the reality of a simulated world.
What is the Matrix?
This term refers to someone who uses their technical skills for malicious purposes.
What is a hacker?
This common security measure requires users to enter a code sent to their mobile device in addition to their password.
What is two-factor authentication (2FA)?
This technology involves using biological characteristics for authentication.
What is biometric security?
This regulation, effective in 2018, enhances data protection and privacy for individuals within the European Union.
What is GDPR (General Data Protection Regulation)?
This 2016 movie is about a cyber warfare expert helping a CIA agent.
What is Snowden?
This type of attack tricks users into giving up sensitive information by pretending to be a trustworthy entity.
What is phishing?
This practice involves regularly updating software to fix security vulnerabilities.
What is patch management?
This technology uses patterns and algorithms to detect and respond to cyber threats.
What is artificial intelligence (AI)?
This U.S. law requires publicly traded companies to disclose any material data breaches to the SEC.
What is the Sarbanes-Oxley Act (SOX)?
This TV show centers around a hacker group known as fsociety.
What is Mr. Robot?
This type of malware locks a user's data and demands payment for its release.
What is ransomware?
This is the term for a weakness in a system that can be exploited by a threat actor.
What is a vulnerability?
This certification, offered by CompTIA, covers foundational security knowledge and skills
What is CompTIA Security+?
This act criminalizes unauthorized access to computer systems and networks.
What is the Computer Fraud and Abuse Act (CFAA)?
This 1995 movie stars Angelina Jolie as a high school hacker.
What is Hackers?
This type of hacker has permission to test and secure systems.
What is a white hat hacker?
This model provides a systematic approach to managing and protecting an organization's sensitive data.
What is the CIA Triad (Confidentiality, Integrity, Availability)?
This act, passed in 2002, aims to protect U.S. government computer systems from cyber threats.
What is the Federal Information Security Management Act (FISMA)?
This framework provides a policy, guidelines, and practices for federal agencies to manage and reduce cybersecurity risk.
What is the NIST framework?
This video game series features a hacker protagonist named Aiden Pearce.
What is Watch Dogs?
This is the term for a government-sponsored hacker.
What is a state-sponsored actor?
This is a security protocol for establishing a secure connection over a computer network.
What is SSL/TLS (Secure Sockets Layer/Transport Layer Security)?
This cybersecurity technique involves creating deceptive resources to attract and detect attackers.
What is a honeypot?