This cybersecurity company recently opened a branch in Wichita and focuses on providing network defense
Who is Novacoast?
The number of areas of critical infrastructure as defined by Department of Homeland Security
What is sixteen?
This type of malware is often associated with encrypting a network until the victim pays a price
What is Ransomware?
This social network has been banned on US government devices
What is Tik Tok?
This method of OSINT discovery involves using search strings and characters
Google Dorking
A group of ethical hackers that know the threat, imitate the threat and teach the threat
What are Red Teams?
This area of critical infrastructure is regulated by the EPA
What is water and wastewater?
A term describing taking advantage of a flaw, hole or bug in software
What is an exploit?
This social network took a lot of heat several years ago for providing user data to an outside company
Who is Facebook?
This search engine is helpful in finding IP addresses, open ports, and such things as active webcams
What is Shodan?
This is the instructors favorite type of country music
What is Outlaw?
This document, signed by the President, lays the foundation for how we protect our nation
What is the National Security Strategy?
These is maintained by Mitre and contains know bugs and holes in software
What are Common Vulnerabilities and Exploits?
The main reason users are addicted to social media
What is fear of missing out?
This OSINT technique is often used by marketers to find analytics about customer behavior
What is scraping?
This Applied Computing Class deals with the psychology and behavior of the user, hacker and software designer.
What is Human Threats?
This relatively new law in Europe has resulted in large fines for not safeguarding individual data
What is the General Data Protection Regulation?
This term of art refers to an email sent to a targeted group of people within an organization
What is spearphishing
A term for a Twitter account that may or may not be automated but is not a real person
What is a troll?
This well of OSINT information is not for the faint of heart
What is the Dark Web?
This Defense Cybersecurity Contractor features three adjunct faculty in the Applied Computing Department
Who is Millennium?
This law, if changed and then applied, could hold social media companies liable for users content
What is Section 230 of the Communications Decency Act?
This type of malware does not self replicate and is exemplified by Zeus
What is a Trojan?
This AI method is used to create high quality deepfakes
Generative Adversarial Network
This type of account is used to draw out information and consists of a fake persona
What is a sockpuppet