CyberSecurity is Sci-Fi Yo!
Making Alphabet Soup Measurable
PK-ey-yi-yi-yi-yi
Literary Litany
Better Know an Org Chart
100
"Trusted Computing"
What is 2001 A Space Odyssey?
100
CVE
What is Common Vulnerabilities and Exposures?
100
CSR stands for this.
What is Certificate Revocation List?
100
This book describes how German hackers used MITRE as a hop point to break into the Government (and is widely panned by people on the infosec list ;))
What is The Cuckoo’s Egg?
100
“Cyber Security” Division
What is G20?
200
“Identity Management”
What is Total Recall?
200
CCE
What is Common Configuration Enumeration?
200
This is the most common format used for PKI certificates
What is x.509?
200
This book by Bruce Sterling describes the hacking scene of the late 1980s and early 1990s.
What is The Hacker Crackdown (Law and Disorder on the Electronic Frontier)?
200
“Cyber & Investigative Tech“ department under “Domestic Security” division
What is G121?
300
"Data Integrity"
What is The Fly?
300
OVAL
What is Open Vulnerability and Assessment Language?
300
PGP and GPG are examples of this type of PKI trust layout
What is web-of-trust?
300
This book by Steven Levy covers computer innovators from the late 1950s to mid 1980s.
What is Hackers: Heroes of the Computer Revolution?
300
"Information Assurance" department under "Enterprise Tech Info & Infrast" division
What is K481?
400
“Access Control”
What is Lawnmower Man?
400
MAEC
What is Malware Attribute Enumeration and Characterization?
400
This SSL certificate authority was compromised in Sept 2011, issued a *.google.com certificate to an attacker, and went bankrupt.
What is Diginotar?
400
The recent book by Mark Russinovich, of Windows’ “System Internals” fame.
What is Zero Day: A Novel?
400
“Cybersecurity & Communications” department under “Nat. Protection & Resilience” division
What is K762?
500
"Virtualization"
What is The Thirteenth Floor?
500
CAPEC
What is Common Attack Pattern Enumeration and Classification?
500
This FireFox plugin utilizes multiple perspectives (and is based on a paper called Perspectives) in order to detect possible Man in the Middle attacks against SSL certificates.
What is Convergence?
500
Bill Neugent’s Fictional Cybersecurity Thriller
What is No Outward Sign?
500
“Comm & Information Security” department under “Air Traffic Syst & Operations” division
What is F03A?
M
e
n
u