Types of Cyber Attacks
Security Concepts
Cyber. Practices
Pop Culture
Misc.
100

This attack targets applications by injecting code directly into an application’s memory.

Memory Injection

100

This principle suggests that users should only have the permissions necessary to perform their job.

Principle of Least Privilege

100

In cybersecurity, the three core principles that protect data are known as this triad.

CIA Triad

100

This famous pop singer, originally part of the boy band NSYNC, became a major solo artist with hits like “Cry Me a River”

Justin Timberlake

100

Name 4 of the 7 wonders of the world

A pitch

200

In this type of attack, hackers exploit session cookies to impersonate a user.

Replay Attack

200

These types of passwords help prevent privilege escalation by being harder to guess

Strong Passwords

200

What is a technique used to manipulate people into revealing sensitive information?

Social engineering

200

Name 3 Justin Bieber Songs

?

200

What car was rapper Easy-E driving on his way to the park to get the scoop, before he saw knuckle heads out there just shootin some hoops?

64 Chevy Impala (SIX FO)

300

An attack where malicious code is hidden in a software update file

Malicious Update Attack

300

The type of escalation when an attacker accesses functions belonging to another user with the same privilege level

Horizontal Escalation

300

What is a vulnerability that is unknown to the software vendor?

Zero-day exploit

300

"Once Upon a Time in Hollywood" Directed by Quinton Tarintino is based on what serial killer and his family? 

The Manson Family

300

Name 1 out of 2 Presidents who have served multiple, non-consecutive terms.

Grover Cleveland , Trump

400

This attack is an attempt to access files in directories above the application's base directory.

Directory Traversal Attack

400

A method of securing data by encoding it in a way that only authorized parties can read it.

Encryption

400

Regularly monitoring logs is a security measure to detect unusual activity that could indicate this.

Security Breach

400

This 1985 film, directed by John Hughes, centers around a high school student skipping class and exploring Chicago in a Ferrari.


Ferris Bueller's Day Off

400
What does the acronym "SQL" Stand for?

Structured Query Language

500

This type of attack involves accessing higher privilege levels, like an admin account, without permission

Privilege Escalation

500

The term for when code is inserted into a web app's data to manipulate outputs.

Injection Attack

500

Programming languages like Python and Java help defend against this type of attack because of their built-in controls.

Overflow Attacks

500

This 1991 film, starring Jodie Foster and Anthony Hopkins, features a psychiatrist trying to track down a serial killer while seeking the help of an incarcerated cannibalistic killer.

The Silence of the Lambs

500

What is Kurt Cobains Birthday

February 20th

M
e
n
u