Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Passwords (General Knowledge, End User)

  • Understand the importance of creating effective passwords
  • Learn how to create a strong yet easy to remember password

Duration: 6 to 10 min

Phishing (Cyber Game, Cyber Challenge)

  • Recognize and identify the features of a phishing message and website

Duration: 3 min

Phishing (General Knowledge, End User)

  • Learn about common phishing tactics and how they threaten information security
  • Recognize and identify the features of a phishing message and website

Duration: 6 to 10 min

Phishing Websites (General Knowledge, End User)

  • Understand common tactics used by hackers to construct phishing websites
  • Learn how to effectively safeguard your data from malicious sites

Duration: 6 to 10 min

Physical Security (General Knowledge, End User)

  • Understand why organizations must secure all their facilities and equipment
  • Learn how common work areas can be protected from threats

Duration: 6 to 10 min

Privacy (Cyber Game, Cyber Challenge)

  • Identify personal information managed by your organization and handle it in compliance with security and privacy requirements

Duration: 3 min

Privacy (General Knowledge, End User)

  • Learn about privacy and related rights and obligations
  • Identify what is considered personal information

Duration: 6 to 10 min

Protecting Payment Card Data (General Knowledge, End User)

  • Understand an organization’s obligation to protect payment card data
  • Learn about the threats to payment card data

Duration: 6 to 10 min

Protecting Your Home Computer (General Knowledge, End User)

  • Learn the common methods used by cyber criminals to gain access to your information
  • Recognize home environment vulnerabilities and risky internet activities

Duration: 6 to 10 min

Protecting Your Home Office (Cyber Game, Cyber Challenge)

  • Identify and eliminate information security vulnerabilities in your home office for safer remote work

Duration: 3 min