CIA
4 D's
3 E's
5 Concepts
Random
100

The principles of CIA 

What is: Confidentiality, Integrity, Availability ?

100

The first "D"

What is Deter ?

100

The most effective "E"

What is Education?

100

Keep it ...

What is Simple?

100

Most common vulnerability in a router 

What is leaving the default username and password?

200

To keep information whole and valid 

What is Integrity?

200

Looking at log-files and using anti-virus devices,  is an example of this

What is Detection

200

Hiring a team of cyber-security employees is a great way to ... rules on your network.

What is Enforce?

200

Security by blocking websites.

What is Security by Limiting?

200

The difference between Data and Information.

What is Information is Data with Context?

300

To keep information on a need-to-know basis.

What is Confidentiality?

300

Once you detect the intruder you would report their location in order to ...

What is Detain

300

Designing your network ahead of time is a great way to... engineer a more secure network. 

What is Engineering?

300

Security by hiding your SSID number?

What is Security by Obscurity?

300

The difference between UDP and TCP.

What is TCP creates a handshake while UDP shouts at you? 

400

How much access there is to the information. 

What is Availability? 

400

Incorporating multiple-layers of security such as: firewalls and canaries are way to... 

What is Delay

400

The Gen-cyber camp is a great way to ... students.

What is Educate?

400

Just like an orgre...

What is Security by Layering?

400

This is the original concept that ip addresses were based on.

What is the Postal System?

500

The end goal that we try to protect.

What is Information?

500

This is a government organization that you can notify if hacked.

What is the U.S Postal Service?

500

In installing our Raspberry Pi's, we managed to ... a new system to our specifications.

What is Engineer?

500

A system including: Cisco, Apache, and Palo Alto technology is an example of...

What is Security by Diversity?

500

This term refers to an ethical a computer hacker who specializes in penetration testing to ensure the security of organization.

What is a White Hat Hacker?

M
e
n
u