CIS Logo
tagline: Confidence in the Connected World


A captcha is a challenge-response test to determine if a user is a human. These tests are often based on visual-perception tasks.


Doxing is the malicious identification and online publication of information about an individual. It can include PII or other sensitive content.


Business Email Compromise (BEC) scams attempt to deceive organizations into sending money or sharing PII to a malicious actor.


Backups are a copy of a system or network’s data for file restoration or archival purposes and are essential for data protection and recovery.


Multi-factor authentication is a digital authentication method that requires two or more distinct authentication factors for successful authentication.


Malware is a malicious software that enters a system via email or suspicious websites.It is designed to perform malicious actions on a device.


Malicious email campaigns attempt to trick a recipient into revealing confidential information, downloading malware, or sending money.


A web attack targets vulnerabilities in websites to gain unauthorized access, obtain confidential information, introduce malicious content, and more.


What it is Spoofing occurs when cyber threat actors seek to disguise their true identity by falsifying the sender of the message in order to trick



What it is Bots are automated applications or scripts designed to perform repetitive tasks without requiring human input Overall, bot activity



Within the information security community, the term hacker does not always have a negative connotation and not all hacking is considered inherently bad.


What is it Social engineering is the use of deception to manipulate individuals into providing a particular response, generally for a fraudulent or



What is it An email bomb is an attack against an email inbox or server designed to overwhelm an inbox or inhibit the server’s normal function,



What is it Phishing occurs when malicious actors masquerade as legitimate entities during electronic communication in an attempt to compromise



What it is Passwords are a critical yet basic authentication mechanism in information security that consists of a combination of alphabetic,



1 2 3