Odds and Ends
Rules and Regulations
Terms of Pain
Socially Acceptable
Open Sources
100

This cybersecurity company recently opened a branch in Wichita and focuses on providing network defense

Who is Novacoast?

100

The number of areas of critical infrastructure as defined by Department of Homeland Security

What is sixteen?


100

This type of malware is often associated with encrypting a network until the victim pays a price

What is Ransomware?

100

This social network has been banned on US government devices

What is Tik Tok?

100

This method of OSINT discovery involves using search strings and characters

Google Dorking

200

A group of ethical hackers that know the threat, imitate the threat and teach the threat 

What are Red Teams?

200

This area of critical infrastructure is regulated by the EPA

What is water and wastewater?

200

A term describing taking advantage of a flaw, hole or bug in software

What is an exploit?

200

This social network took a lot of heat several years ago for providing user data to an outside company

Who is Facebook?

200

This search engine is helpful in finding IP addresses, open ports, and such things as active webcams

What is Shodan?

300

This is the instructors favorite type of country music

What is Outlaw?

300

This document, signed by the President, lays the foundation for how we protect our nation

What is the National Security Strategy?

300

These is maintained by Mitre and contains know bugs and holes in software

What are Common Vulnerabilities and Exploits?

300

The main reason users are addicted to social media

What is fear of missing out?

300

This OSINT technique is often used by marketers to find analytics about customer behavior 

What is scraping?

400

This Applied Computing Class deals with the psychology and behavior of the user, hacker and software designer.

What is Human Threats?

400

This relatively new law in Europe has resulted in large fines for not safeguarding individual data

What is the General Data Protection Regulation?

400

This term of art refers to an email sent to a targeted group of people within an organization

What is spearphishing

400

A term for a Twitter account that may or may not be automated but is not a real person

What is a troll?

400

This well of OSINT information is not for the faint of heart

What is the Dark Web?

500

This Defense Cybersecurity Contractor features three adjunct faculty in the Applied Computing Department

Who is Millennium?


500

This law, if changed and then applied, could hold social media companies liable for users content

What is Section 230 of the Communications Decency Act?

500

This type of malware does not self replicate and is exemplified by Zeus

What is a Trojan?

500

This AI method is used to create high quality deepfakes 

Generative Adversarial Network

500

This type of account is used to draw out information and consists of a fake persona 

What is a sockpuppet

M
e
n
u