A type of malware that tricks users into installing it pretending to be something else.
What is a Trojan?
The most widely used protocol for browsing the World Wide Web.
What is HTTP?
This low skilled threat actor typically hacks for fun and not profit.
What is a script kiddie?
This type of software detects and prevents malware based on signatures.
What is AntiVirus?
He is widely credited as the inventor of the World Wide Web.
Who is Tim Berners-Lee?
The practice of disguising an email to look like it’s from a trusted sender to steal credentials.
What is Phishing?
This Layer 3 device forwards packets between networks.
What is a router?
This 2017 ransomware attack was attributed to North Korea, crippling the NHS and spread worldwide.
What is WannaCry?
This device originally operated at Layer 4 to block or allow traffic, with more modern versions providing protection at Layer 7.
What is a firewall?
This operating system was created in 1991 and is now the backbone of most servers on the internet.
What is Linux?
This four digit code can be used to unlock a smartphone.
What is a PIN?
Port 443 is reserved for this secure protocol.
What is HTTPS?
This framework, published by MITRE, categorises adversary tactics and techniques.
What is ATT&CK?
This concept involves having multiple different controls often at different points along the kill chain.
What is defence-in-depth?
This malware, released in 1988, was widely regarded as the first major internet virus.
What is the Morris Worm?
This attack overwhelms a server making it unavailable
What is DDoS?
This DNS record amps a domain name to an IPv4 address.
What is an A record?
This technique exploits leftover data in memory after it was freed.
What is a use-after-free vulnerability?
What is SysMon?
An email transmitted malware spread in 1999 had this touching but insincere subject line.
What is ILOVEYOU?
This security principle means giving a user only the access they need and nothing more.
What is the Principle of Least Privilege?
This secure protocol typically is run on port 22, and is the primary method of accessing a Linux server.
What is SSH?
This state sponsored group were linked to the SolarWinds supply-chain compromise.
What is APT29 (Cozy Bear)?
This is a device used to protect application layer traffic toward websites to control and filter requests.
What is a WAF?
This 2003 computer worm affected servers running a popular Microsoft relational database software and was blamed for crashing routers worldwide.
What is SQL Slammer?