Stands For...
High-Profile Attacks
Cyber Law and Governance
Looks Like It
Low Level
100

This AES symmetric algorithm secures data in blocks with variable key sizes.

What is Advanced Encryption Standard?

100

The perpetrators of this 2014 attack on a major film studio apparently lacked a sense of humor, demanding the action-comedy film The Interview to be withdrawn.

What was the Sony Pictures hack?

100

This US law requires healthcare providers to protect patient data and ensures "portability" of insurance.


What is the Health Insurance Portability and Accountability Act (HIPAA)?


100

A file type:
RIFF\ÐúWAVEfmt D¬±data8Ðú••OOööââÙÙÙÙààèèëëççÓÓªªhh

“ÿ“ÿÿÿXþXþŸýŸýÜüÜüüüWûWû§ú§úúúŽùŽù3ù3ùþøþøñøñø
ù
ùOùOù´ù´ù8ú8úÒúÒúyûyû%ü%üËüËüaýaýâýâýIþIþ”þ”þÅþÅþÛþÛþ×þ×þ¾þ¾þ“þ“þ]þ]þ&



What is a wave file?

100

It is the world’s most popular debugging tool.

What is GDB?

200

This ICMP is used by network devices to diagnose network communication issues.

What is Internet Control Message Protocol?

200

Disaster was narrowly avoided after this backdoor, planted by a “Jia Tan,” was discovered by Microsoft employee Andres Freund.


What was the XZ Utils Backdoor?

200

This US agency, founded under the Department of Homeland Security in 2018, is America’s primary cyber defense agency.

What is the Cybersecurity and Infrastructure Security Agency (CISA)?

200

An encoding: Hello%20Cornell%20Cyber!%0AThis%20text%20has%20whitespace

What is URL encoding? (Also accept percent encoding.)

200

This open source Instruction Set Architecture (ISA) is used by the Raspberry Pi Pico 2 and some newer ESP32 versions.


What is RISC-V?

300

APT could stand for Advanced Persistent Threat. Also, a package manager in Debian systems.

What is Advanced Package Tool?

300

This sophisticated cyber weapon was discovered in 2010 and was specifically designed to sabotage Iran’s nuclear program.

What was Stuxnet?

300

This 1986 US law is the primary federal statute used to prosecute hacking and unauthorized access to computers.

What is the CFAA (Computer Fraud and Abuse Act)?

300

A cipher with a key of three: Horlbel onl ye!lCeCr

What is rail fence cipher? (Also accept zig-zag cipher.)


300

In the context of hardware security, TPM stands for this dedicated chip that acts as a crypto processor.

What is a Trusted Platform Module?

400

Unfortunately not apple juice, this CIDR.

What is Classless Inter-Domain Routing?

400

Discovered in 2021, this remote code execution (RCE) vulnerability affecting a popular Java logging framework had a CVSS severity score of 10.

What is Log4Shell?

400

Section 230 of this 1996 Act provides immunity to online platforms from civil liability based on third-party content.

What is the Communications Decency Act?

400

A vulnerability:
int main() {
    int *ptr = (int *)malloc(sizeof(int));
    *ptr = 10;

    free(ptr);

    do_something(ptr);
    return 0;
}

What is use after free?

400

A technique involving deliberately introducing errors into hardware systems. Can be done with voltage glitching, using a coil to introduce EM pulses, and lasers among other methods.

What is fault injection?

500

Notably, it’s own thing: GNU.

What is GNU’s Not Unix?

500

In 2017, this ransomware spread globally, targeting Windows machines and demanding Bitcoin payments, famously hitting the UK's NHS.

What is WannaCry?

500

This EU regulation, which went into effect in 2018, gives citizens control over their personal data and carries heavy fines for non-compliance.

What is the General Data Protection Regulation (GDPR)?

500

A programming language extended by GNU Guile:
(define hello
  (lambda ()
    (display "Hello, World!")
    (newline)))

(hello)

What is Scheme?

500

A technique used by pipelined CPUs to avoid wasted cycles involving jump instructions (or their analogs).

What is branch prediction?

M
e
n
u