New Activity
Play Alphabet Game
A
B
C
D
E
F
H
G
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Starts with  
A
The process of verifying the identity of a user or system.
Starts with  
B
A network of infected computers controlled by a malicious actor.
Starts with  
C
An intentional act of compromising computer systems or networks.
Starts with  
D
Unauthorized access or release of sensitive information.
Starts with  
E
The process of converting data into a form that is unreadable without a decryption key.
Starts with  
F
A network security device that monitors and filters incoming and outgoing network traffic.
Starts with  
H
A person who uses their technical skills to gain unauthorized access to computer systems.
Starts with  
G
It must be ensured that the exploit has worked and has not been detected by the organisation's tools.
Starts with  
I
The process of handling and mitigating the impact of a cybersecurity incident.
Starts with  
J
A programming language commonly used in the development of secure applications.
Contains  
K
the possibility that a system will suffer a security incident and that a threat will materialise causing a series of damages.
Contains  
L
persistent access to multiple systems in the organisation.
Starts with  
M
A security measure that requires multiple forms of verification to access a system or account.
Starts with  
N
The practice of preventing and protecting against unauthorized access, misuse, or modification of a computer network.
Starts with  
O
Software that is freely available and can be modified and distributed by anyone.
Starts with  
P
This is a trivial algorithm, where each letter of the alphabet is replaced by the coordinates of its position in a square.
Starts with  
Q
A field of study focused on developing computer technology based on the principles of quantum theory.
Starts with  
R
A type of malware that encrypts a victim's files and demands a ransom for their release.
Starts with  
S
can be considered the first system of cryptography by transposition
Starts with  
T
A security measure that requires two forms of verification to access a system or account.
Starts with  
U
devices that are used to provide protection against electrical problems and power outages.
Starts with  
V
A weakness or flaw in a system that can be exploited by attackers to gain unauthorized access or cause harm.
Starts with  
W
Hacker who seeks to check for possible intrusions.
Contains  
X
It must be ensured that the exploit has worked and has not been detected by the organisation's tools.
Contains  
Y
"Free and exempt from all danger, damage or risk."
Starts with  
Z
A software vulnerability that is unknown to the software vendor and has no available patch or fix.