This attack tricks users into revealing sensitive information through fake emails or messages.
What is phishing?
A command-line tool used to display and configure network interfaces.
What is ifconfig (or ip command)?
This U.S. agency is responsible for defending federal networks and supporting national cybersecurity.
What is CISA (Cybersecurity and Infrastructure Security Agency)?
This is the year that WiCyS was founded.
What is 2012?
A unique address assigned to a device on a network.
What is an IP address?
Malware that spreads itself automatically across networks without user interaction.
What is a worm?
A Linux distribution specifically designed for penetration testing.
What is Kali Linux?
A regulation focused on protecting personal data of EU citizens.
What is GDPR?
Each year, WiCyS brings together students, academics, and industry professionals at this event.
What is WiCyS National Conference?
The protocol used to send email over the internet.
What is SMTP?
An attack that injects malicious code into a website to run in a user’s browser.
What is Cross-Site Scripting (XSS)?
A security solution that correlates alerts from multiple sources to detect threats.
What is a SIEM?
A U.S. framework that provides guidelines for managing privacy risks.
What is the NIST Privacy Framework?
This program within WiCyS pairs professionals with students to provide career guidance and support.
What is the WiCyS Mentorship Program?
The process of confirming a user’s identity.
What is authentication?
An attack that redirects users from a legitimate website to a fake one.
What is DNS spoofing (or DNS poisoning)?
A tool used to automate vulnerability scanning of systems and applications.
What is Nessus?
The NIST Cybersecurity Framework is built around these five core functions: Identify, Protect, Detect, Respond, and this.
What is Recover?
This woman founded the Women in CyberSecurity (WiCyS) organization in 2012.
Who is Dr. Ambareen Siraj?
This type of cryptography uses two keys: a public key and a private key.
What is asymmetric encryption?
A vulnerability that allows attackers to execute code before a patch is available.
What is a zero-day exploit?
A framework used to emulate adversary behavior for defensive testing.
What is MITRE CALDERA?
A compliance standard required for organizations that handle credit card information.
What is PCI DSS?
WiCyS was founded at this U.S. university.
What is Tennessee Tech University?
A security principle that assumes breaches will happen and designs systems accordingly.
What is defense in depth?