General Updated 4 hours ago

Cybersecurity Awareness & Digital Defense (2026)

Essential guide to modern digital security. Learn to identify AI-powered scams, understand Zero Trust principles, and master the tools needed to protect your personal and professional data in an era of advanced cyber threats.

6 Views
0 Likes
22 Cards

Cards in this deck

Question #1

What is "Phishing"?

Answer

A fraudulent attempt to steal sensitive data (passwords, credit card numbers) by disguised as a trustworthy entity in an email or message.

Question #2

Define "Spear Phishing".

Answer

A highly targeted phishing attack that uses specific personal details about the victim to appear more convincing.

Question #3

What is an "AI Deepfake Scam"?

Answer

Using AI-generated audio or video to impersonate a known person (like a CEO or family member) to trick someone into transferring money.

Question #4

What is Multi-Factor Authentication (MFA)?

Answer

A security system that requires two or more separate forms of identification to access an account (e.g., password + code from an app).

Question #5

Define "Social Engineering".

Answer

The psychological manipulation of people into performing actions or divulging confidential information.

Question #6

What is "Ransomware"?

Answer

Malicious software that encrypts a user's files, with the attacker demanding a payment (ransom) to restore access.

Question #7

What is a "Zero Trust" Architecture?

Answer

A security model based on the principle "never trust, always verify," requiring strict identity verification for every person and device.

Question #8

Define "Smishing".

Answer

Phishing attacks conducted specifically through SMS (text messages) rather than email.

Question #9

What is a "Password Manager"?

Answer

A software tool that generates, stores, and encrypts complex, unique passwords for all your online accounts.

Question #10

What is "Vishing"?

Answer

Voice Phishing; using phone calls or VoIP to trick victims into giving up personal or financial information.

Question #11

What is a "VPN" (Virtual Private Network)?

Answer

A service that creates a secure, encrypted connection between your device and the internet to hide your IP address and data.

Question #12

Define "Public Wi-Fi Risks".

Answer

Unsecured networks that allow attackers to intercept your data (Man-in-the-Middle attacks) while you browse.

Question #13

What is "Juice Jacking"?

Answer

A cyberattack where malware is installed or data is stolen from a device through a public USB charging port.

Question #14

What is "Data Breach"?

Answer

An incident where sensitive, protected, or confidential data is copied, transmitted, or viewed by an unauthorized individual.

Question #15

Define "Endpoint Security".

Answer

The practice of securing entry points of end-user devices (laptops, mobile phones) from being exploited by malicious actors.

Question #16

What is "Passkeys"?

Answer

A modern replacement for passwords that uses your device’s local authentication (biometrics/PIN) to log into websites securely.

Question #17

What is "Encryption"?

Answer

The process of converting information into a secret code that hides the information's true meaning from unauthorized viewers.

Question #18

Define "Botnet".

Answer

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.

Question #19

What is "Shoulder Surfing"?

Answer

Looking over someone's shoulder to steal their PIN, password, or sensitive information while they use a device.

Question #20

What is "Whaling"?

Answer

A form of spear phishing aimed specifically at high-level executives (the "big fish") of a company.

Question #21

Define "DDoS Attack".

Answer

Distributed Denial of Service; an attempt to crash a website or server by flooding it with an overwhelming amount of traffic.

Question #22

What is "Two-Factor Authentication" (2FA)?

Answer

A subset of MFA that specifically uses two different layers of security to verify a user's identity.