Cyber Buzzwords
Secure Design Patterns
Cloud Security
Famous Breaches
Red vs Blue
100

What does 'Zero Trust' mean?

A security model that requires verification for every person and device trying to access resources.

100

What is 'Defense in Depth'?

A security strategy that uses multiple layers of defense to protect systems.

100

What is 'Shared Responsibility Model'?

A cloud security framework where both the cloud provider and customer share security responsibilities.

100

What happened in the 'Equifax Breach'?

A data breach in 2017 that exposed personal information of 147 million people.

100

What is 'Red Teaming'?

A security practice where a group simulates attacks to test defenses.

200

Define 'Firewall'.

A network security device that monitors and filters incoming and outgoing network traffic.

200

Define 'Least Privilege'.

A principle that restricts access rights for users to the bare minimum necessary.

200

Define 'Encryption at Rest'.

The practice of encrypting data stored on physical media to protect it from unauthorized access.

200

Explain the 'Yahoo Breach'.

A series of data breaches from 2013 to 2016 that affected 3 billion user accounts.

200

Define 'Blue Team'.

A group responsible for defending against attacks and ensuring security.

300

What is 'Microsegmentation'?

A security technique that divides a network into smaller segments to reduce attack surfaces.

300

Explain 'Separation of Duties'.

A security principle that divides responsibilities to prevent fraud and errors.

300

Explain 'Multi-Factor Authentication'.

A security process that requires multiple forms of verification before granting access.

300

What is the national animal of Scotland?

Unicorn.

300

Explain 'Penetration Testing'.

A security testing method where simulated attacks are performed to identify vulnerabilities.

400

Explain 'IAM'.

Identity and Access Management, a framework for managing digital identities and access rights.

400

What is 'Fail-Safe Defaults'?

A design principle where access is denied by default and granted only when explicitly allowed.

400

What is 'CASB'?

Cloud Access Security Broker, a security policy enforcement point between cloud service consumers and providers.

400

Define the 'Sony Pictures Hack'.

A cyber attack in 2014 that led to the leak of confidential data and unreleased films.

400

What is the only mammal capable of true flight?

Bat.


500

What color is an aircraft’s black box?

Orange.

500

Define 'Economy of Mechanism'.

A principle that advocates for simple and small security mechanisms to reduce errors.

500

Define 'Serverless Security'.

Security practices and measures for applications running in serverless environments.

500

What is the 'Marriott Breach'?

A data breach in 2018 that exposed personal information of 500 million guests.

500

Define 'Threat Hunting'.

The proactive search for cyber threats within a network or system.

M
e
n
u