This AES symmetric algorithm secures data in blocks with variable key sizes.
What is Advanced Encryption Standard?
The perpetrators of this 2014 attack on a major film studio apparently lacked a sense of humor, demanding the action-comedy film The Interview to be withdrawn.
What was the Sony Pictures hack?
This US law requires healthcare providers to protect patient data and ensures "portability" of insurance.
What is the Health Insurance Portability and Accountability Act (HIPAA)?
A file type:
RIFF\ÐúWAVEfmt D¬±data8ÐúOOööââÙÙÙÙààèèëëççÓÓªªhh
ÿÿÿÿXþXþýýÜüÜüüüWûWû§ú§úúúùù3ù3ùþøþøñøñø
ù
ùOùOù´ù´ù8ú8úÒúÒúyûyû%ü%üËüËüaýaýâýâýIþIþþþÅþÅþÛþÛþ×þ×þ¾þ¾þþþ]þ]þ&
What is a wave file?
It is the world’s most popular debugging tool.
What is GDB?
This ICMP is used by network devices to diagnose network communication issues.
What is Internet Control Message Protocol?
Disaster was narrowly avoided after this backdoor, planted by a “Jia Tan,” was discovered by Microsoft employee Andres Freund.
What was the XZ Utils Backdoor?
This US agency, founded under the Department of Homeland Security in 2018, is America’s primary cyber defense agency.
What is the Cybersecurity and Infrastructure Security Agency (CISA)?
An encoding: Hello%20Cornell%20Cyber!%0AThis%20text%20has%20whitespace
What is URL encoding? (Also accept percent encoding.)
This open source Instruction Set Architecture (ISA) is used by the Raspberry Pi Pico 2 and some newer ESP32 versions.
What is RISC-V?
APT could stand for Advanced Persistent Threat. Also, a package manager in Debian systems.
What is Advanced Package Tool?
This sophisticated cyber weapon was discovered in 2010 and was specifically designed to sabotage Iran’s nuclear program.
What was Stuxnet?
This 1986 US law is the primary federal statute used to prosecute hacking and unauthorized access to computers.
What is the CFAA (Computer Fraud and Abuse Act)?
A cipher with a key of three: Horlbel onl ye!lCeCr
What is rail fence cipher? (Also accept zig-zag cipher.)
In the context of hardware security, TPM stands for this dedicated chip that acts as a crypto processor.
What is a Trusted Platform Module?
Unfortunately not apple juice, this CIDR.
What is Classless Inter-Domain Routing?
Discovered in 2021, this remote code execution (RCE) vulnerability affecting a popular Java logging framework had a CVSS severity score of 10.
What is Log4Shell?
Section 230 of this 1996 Act provides immunity to online platforms from civil liability based on third-party content.
What is the Communications Decency Act?
A vulnerability:
int main() {
int *ptr = (int *)malloc(sizeof(int));
*ptr = 10;
free(ptr);
do_something(ptr);
return 0;
}
What is use after free?
A technique involving deliberately introducing errors into hardware systems. Can be done with voltage glitching, using a coil to introduce EM pulses, and lasers among other methods.
What is fault injection?
Notably, it’s own thing: GNU.
What is GNU’s Not Unix?
In 2017, this ransomware spread globally, targeting Windows machines and demanding Bitcoin payments, famously hitting the UK's NHS.
What is WannaCry?
This EU regulation, which went into effect in 2018, gives citizens control over their personal data and carries heavy fines for non-compliance.
What is the General Data Protection Regulation (GDPR)?
A programming language extended by GNU Guile:
(define hello
(lambda ()
(display "Hello, World!")
(newline)))
(hello)
What is Scheme?
A technique used by pipelined CPUs to avoid wasted cycles involving jump instructions (or their analogs).
What is branch prediction?