Log in
New Activity
Types of activities
Support center
Enter your Game Pin
Blog
Premium
English
Español
Français
New Activity
Log in
All the activities
Play Alphabet Game
Print Alphabet Game
Cybersecurity Quiz
Author :
Juan Carlos Perez Guillen
A
B
C
D
E
F
H
G
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Starts with
A
The process of verifying the identity of a user or system.
Starts with
B
A network of infected computers controlled by a malicious actor.
Starts with
C
An intentional act of compromising computer systems or networks.
Starts with
D
Unauthorized access or release of sensitive information.
Starts with
E
The process of converting data into a form that is unreadable without a decryption key.
Starts with
F
A network security device that monitors and filters incoming and outgoing network traffic.
Starts with
H
A person who uses their technical skills to gain unauthorized access to computer systems.
Starts with
G
It must be ensured that the exploit has worked and has not been detected by the organisation's tools.
Starts with
I
The process of handling and mitigating the impact of a cybersecurity incident.
Starts with
J
A programming language commonly used in the development of secure applications.
Contains
K
the possibility that a system will suffer a security incident and that a threat will materialise causing a series of damages.
Contains
L
persistent access to multiple systems in the organisation.
Starts with
M
A security measure that requires multiple forms of verification to access a system or account.
Starts with
N
The practice of preventing and protecting against unauthorized access, misuse, or modification of a computer network.
Starts with
O
Software that is freely available and can be modified and distributed by anyone.
Starts with
P
This is a trivial algorithm, where each letter of the alphabet is replaced by the coordinates of its position in a square.
Starts with
Q
A field of study focused on developing computer technology based on the principles of quantum theory.
Starts with
R
A type of malware that encrypts a victim's files and demands a ransom for their release.
Starts with
S
can be considered the first system of cryptography by transposition
Starts with
T
A security measure that requires two forms of verification to access a system or account.
Starts with
U
devices that are used to provide protection against electrical problems and power outages.
Starts with
V
A weakness or flaw in a system that can be exploited by attackers to gain unauthorized access or cause harm.
Starts with
W
Hacker who seeks to check for possible intrusions.
Contains
X
It must be ensured that the exploit has worked and has not been detected by the organisation's tools.
Contains
Y
"Free and exempt from all danger, damage or risk."
Starts with
Z
A software vulnerability that is unknown to the software vendor and has no available patch or fix.