Cyber Security
Cryptography
OSINT
100

The recommended number of characters in your password for it to be secure

8-12

100

This cipher uses a simple substitution of the alphabet

Caesar cipher

100

The first computer virus

Creeper

200

This attack is commonly sent via email and is successful among the elderly

phishing

200

This device was used to protect military information and communication

Enigma

200

This was the first year that Crimson Defense hosted UACTF

2019

300

This computer virus is self-replicating without the need for human interaction

worm

300

This cipher was made popular by Sherlock Holmes

Dancing Man

300

The name of the Crimson Defense treasurer

Grace Neil

400

This method of infiltration or elicitation is referred to as "human hacking"

social engineering

400

This alien language cipher was made popular by a TV show

Futurama

400

This country had the highest number of cybercrime victims per million internet users

UK

500

This major cyber security incident took place in 2017 and caused $4 billion in damages

WannaCry

500

A substitution cipher from an Edgar Allan Poe short story

Gold Bug

500

33.21480972320549, -87.54392301365687

SERC 2009

M
e
n
u