MALWARE
HALLOWEEN
CRYPTOGRAPHY
HALLOWEEN
ATTACKS
100

Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to private computer systems

What is malware

100

This mythical beings defy death by sucking the blood of humans

What are vampires

100

This is another term for Asymmetric Cryptography

Public-Key Cryptography

100

Superstition says bad luck is imminent if you cross paths with this color cat

What is black

100

Tricks users in to giving sensitive information

What is social engineering

200

A computer program containing malicious segment that attaches itself to an application program or other executable component

What is a virus

200

This is considered the birthplace of Halloween

What is Ireland

200

Stream Ciphers are commonly used for

What is videos or streams

200

The word witch comes from the Old English word wicce, meaning

What is wise woman

200

Users are not able to access or utilize a system

What is Denial-of-service (DoS) attack

300

Malicious software collecting information about users without their knowledge/consent

What is spyware

300

Michael Meyers mask was actually this actor's mask from Star Trek

Who is William Shatner

300

Cryptography or Encryption falls under what part of the CIA triad?

What is Confidentiality

300

This monster was created as a science experiment

What is Frankenstein

300
Systematically attempts to use all possible passwords and combinations

Brute Force Attack

400

Malicious software that initially presents itself as legitimate program or file

What is a Trojan

400

This famous magician died on Halloween night in 1926

Who is Harry Houdini

400

This subatomic particle is used in quantum cryptography

What is a photon

400

This was the first wrapped penny candy in America

What is the tootsie roll

400

Used to crack common word passwords

What is Dictionary Attack

500

The famous worm was suspected for damaging Iran's nuclear power plant

What is Stuxnet

500

What do you get if you divide the circumference of a pumpkin by it's diameter?

What is pumpkin (pie sign)

500

Of stream and block ciphers, which one is symmetric?

What is both

500

According to tradition, if a person wears his or her clothes inside out and then walks backwards on Halloween, he or she will see a what at midnight

What is a witch

500

Exploited vulnerability that was present since the release of a product

What is Zero Day Attack

M
e
n
u