Glossary
Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
Passwords (General Knowledge, End User)
- Understand the importance of creating effective passwords
- Learn how to create a strong yet easy to remember password
Duration: 6 to 10 min
Phishing (Cyber Game, Cyber Challenge)
- Recognize and identify the features of a phishing message and website
Duration: 3 min
Phishing (General Knowledge, End User)
- Learn about common phishing tactics and how they threaten information security
- Recognize and identify the features of a phishing message and website
Duration: 6 to 10 min
Phishing Websites (General Knowledge, End User)
- Understand common tactics used by hackers to construct phishing websites
- Learn how to effectively safeguard your data from malicious sites
Duration: 6 to 10 min
Physical Security (General Knowledge, End User)
- Understand why organizations must secure all their facilities and equipment
- Learn how common work areas can be protected from threats
Duration: 6 to 10 min
Privacy (Cyber Game, Cyber Challenge)
- Identify personal information managed by your organization and handle it in compliance with security and privacy requirements
Duration: 3 min
Privacy (General Knowledge, End User)
- Learn about privacy and related rights and obligations
- Identify what is considered personal information
Duration: 6 to 10 min
Protecting Payment Card Data (General Knowledge, End User)
- Understand an organization’s obligation to protect payment card data
- Learn about the threats to payment card data
Duration: 6 to 10 min
Protecting Your Home Computer (General Knowledge, End User)
- Learn the common methods used by cyber criminals to gain access to your information
- Recognize home environment vulnerabilities and risky internet activities
Duration: 6 to 10 min
Protecting Your Home Office (Cyber Game, Cyber Challenge)
- Identify and eliminate information security vulnerabilities in your home office for safer remote work
Duration: 3 min