Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Access Control (General Knowledge, End User)

  • Learn why organizations must control access to their networks and systems
  • Understand the processes involved in granting and monitoring access

Duration: 6 to 10 min

BEC (Cyber Game, Serious Game)

  • Play as a cybersecurity investigator and examine different emails to identify all valid vendor payments and stop any potentially fraudulent payments due to Business Email Compromise

Duration: 5 to 10 min

Business Email Compromise (General Knowledge, End User)

  • Understand what constitutes a business email compromise attack and how it is mounted
  • Learn the common phishing-based scams used in such attacks

Duration: 6 to 10 min

Cloud Based Services (Cyber Game, Serious Game)

  • Play as a legendary cybersecurity analyst with the responsibility of identifying the source of the data leaks and putting a stop to it, before any more damage can be done

Duration: 5 to 10 min

Cloud Services (Cyber Game, Cyber Challenge)

  • Assess the risk level associated with various cloud computing practices to keep your and your organization’s information safe

Duration: 3 min

Cloud Services (General Knowledge, End User)

  • Recognize the potential vulnerabilities related to storing, sharing, and accessing cloud-based documents or systems
  • Learn how to use cloud services securely with cyber-safe collaboration techniques

Duration: 6 to 10 min

Confidentiality on the Web (General Knowledge, End User)

  • Understand the risks of inadvertently disclosing sensitive information on the web
  • Understand and recognize potential online threats

Duration: 6 to 10 min

Data Leakage (General Knowledge, End User)

  • Understand what constitutes a data leak and how it affects an organization
  • Learn common internal and external data leaks causes

Duration: 6 to 10 min

Data Transfer (Cyber Game, Serious Game)

  • Play as an employee in the Business Operations department and finish your weekly to-do list by carefully managing your files and emails for a stress-free weekend, without risking being interrupted due to a major data breach

Duration: 5 to 10 min

Email (Cyber Game, Cyber Challenge)

  • Describe and differentiate the email-based strategies fraudsters use to infiltrate organizational networks or access confidential information

Duration: 3 min

Email (General Knowledge, End User)

  • Recognize common email threats and email misuse
  • Learn what precautions to take with incoming and outgoing emails

Duration: 6 to 10 min

Identity Theft (General Knowledge, End User)

  • Understand how identity theft affects victims and organizations
  • Learn about common methods used to carry out identity theft

Duration: 6 to 10 min

Incident Identification for Reporting (Cyber Game, Cyber Challenge)

  • Identify security incidents and report them to the appropriate instances in a timely manner to help protect your organization

Duration: 3 min

Incident Reporting (General Knowledge, End User)

  • Understand the importance of detecting and handling security incidents promptly
  • Learn how to identify and detect various types of security incidents

Duration: 6 to 10 min

Information Classification (Cyber Game, Cyber Challenge)

  • Classify information based on its sensitivity levels so as to apply appropriate security measures

Duration: 3 min

Information Classification (General Knowledge, End User)

  • Understand how and why organizations classify their information
  • Practice classifying information according to levels of sensitivity

Duration: 6 to 10 min

Information Lifecycle (General Knowledge, End User)

  • Understand the value of an organization’s information
  • Learn how to manage information correctly throughout its lifecycle

Duration: 6 to 10 min

Intellectual Property (General Knowledge, End User)

  • Learn what is considered intellectual property
  • Understand behaviors and situations that may violate intellectual property rights

Duration: 6 to 10 min

Introduction to Information Security (General Knowledge, End User)

  • Learn about information security and its overall importance
  • Understand users’ responsibilities in protecting the organization’s information

Duration: 6 to 10 min

Malware (Cyber Game, Cyber Challenge)

  • Examine and identify ways in which malicious programs can infiltrate your electronic devices

Duration: 3 min

Malware (General Knowledge, End User)

  • Learn about the different types of malware
  • Understand the human behaviors and technical factors involved in preventing malware infection

Duration: 6 to 10 min

Mobile Devices (Cyber Game, Cyber Challenge)

  • Adopt best practices when using mobile devices in order to protect your company and personal information

Duration: 3 min

Mobile Devices (General Knowledge, End User)

  • Understand the vulnerabilities related to mobile devices
  • Learn about preserving the security and integrity of mobile devices

Duration: 6 to 10 min

Open Wi-Fi Risks (General Knowledge, End User)

  • Understand the potential risks of connecting to an unsecured Wi-Fi network
  • Learn best practices when it comes to sharing information of a network outside your home or office

Duration: 6 to 10 min

Passwords (General Knowledge, End User)

  • Understand the importance of creating effective passwords
  • Learn how to create a strong yet easy to remember password

Duration: 6 to 10 min

Phishing (Cyber Game, Cyber Challenge)

  • Recognize and identify the features of a phishing message and website

Duration: 3 min

Phishing (General Knowledge, End User)

  • Learn about common phishing tactics and how they threaten information security
  • Recognize and identify the features of a phishing message and website

Duration: 6 to 10 min

Phishing Websites (General Knowledge, End User)

  • Understand common tactics used by hackers to construct phishing websites
  • Learn how to effectively safeguard your data from malicious sites

Duration: 6 to 10 min

Physical Security (General Knowledge, End User)

  • Understand why organizations must secure all their facilities and equipment
  • Learn how common work areas can be protected from threats

Duration: 6 to 10 min

Privacy (Cyber Game, Cyber Challenge)

  • Identify personal information managed by your organization and handle it in compliance with security and privacy requirements

Duration: 3 min

Privacy (General Knowledge, End User)

  • Learn about privacy and related rights and obligations
  • Identify what is considered personal information

Duration: 6 to 10 min

Protecting Payment Card Data (General Knowledge, End User)

  • Understand an organization’s obligation to protect payment card data
  • Learn about the threats to payment card data

Duration: 6 to 10 min

Protecting Your Home Computer (General Knowledge, End User)

  • Learn the common methods used by cyber criminals to gain access to your information
  • Recognize home environment vulnerabilities and risky internet activities

Duration: 6 to 10 min

Protecting Your Home Office (Cyber Game, Cyber Challenge)

  • Identify and eliminate information security vulnerabilities in your home office for safer remote work

Duration: 3 min

Ransomware (Cyber Game, Cyber Challenge)

  • Understand the risks associated with ransomware attacks, and apply best practices to keep your organization’s information safe

Duration: 3 min

Ransomware (Cyber Game, Serious Game)

  • Play as a cybersecurity investigator trainee and race against the clock to identify the source of a ransomware attack before an organization’s entire system is compromised

Duration: 5 to 10 min