Malware
Threat Actors
Word Scramble
Controls
Random
100

The first worm to spread extensively "in the wild"

MORRIS WORM

100

An American whistle-blower who copied and leaked highly classified information from the National Security Agency in 2013 when he was a Central Intelligence Agency employee and subcontractor.

EDWARD SNOWDEN

100

inrgttyie

INTEGRITY

100

The process of identifying a person, system or piece of information, and the veracity of information provided.

AUTHENTICATION

100

An IoT botnet famous for launching DDoS attacks on Dyn DNS and Brian Kreb's website

MIRAI

200

Widely viewed as the most advanced form of malware ever created, this malware targeted Industrial Control Systems

STUXNET

200

A convicted hacker turned author and security consultant. Best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes.

KEVIN MITNICK

200

tales vrpeiglie

LEAST PRIVILEGE

200

This offers safeguards against a disaster, and outlines the strategies, action plan on how to continue business as usual in the event of any disaster.

BUSINESS CONTINUITY PLAN

200

The process of creating multiple layers of security to protect electronics and information resources against attackers.

DEFENSE IN-DEPTH

300

Named after a famous tennis player, this virus was spread by emails to the contacts in the compromised address book of Microsoft Outlook.

ANNA KOURNIKOVA

300

A decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several government institutions and government agencies, corporations, and the Church of Scientology.

ANONYMOUS

300

oslrimpmpohy

POLYMORPHISM

300

______ is the technique used for filtering of outgoing network traffic.

EGRESS FILTERING

300

The port number of Internet Message Access Protocol (IMAP) over SSL

993

400

This botnet was used to distribute many pieces of malware, most notably Locky ransomware.

NECURS

400

In the summer of 2016, they published several leaks of some of the National Security Agency (NSA) hacking tools.

SHADOW BROKERS

400

iitaudoronnenp

NONREPUDIATION

400

______ defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.

ATTRIBUTE BASED ACCESS CONTROL

400

Single-domain SSL (Secure Sockets Layer) certificates that offer the highest degree of authentication and SSL protection.

EXTENDED VALIDATION (EV) CERTIFICATES

500

First seen in 2016, this ransomware was spread via an aggressive phishing campaign and leveraged the dridex infrastructure to target hospitals in the US.

LOCKY

500

The authors of the "Lizard Stresser" tool, an online service that allowed paying customers to launch attacks capable of taking Web sites offline for up to eight hours at a time.

LIZARD SQUAD

500

eostencomirnitgam

MICROSEGMENTATION

500

A key agreement protocol based on asymmetric cryptography that ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the private keys is compromised in the future.

PERFECT FORWARD SECRECY

500

A form of encryption that allows computation on ciphertexts, generating an encrypted result which, when decrypted, matches the result of the operations as if they had been performed on the plaintext.

HOMOMORPHIC ENCRYPTION

M
e
n
u