Unsolicited junk emails sent out in bulk to a large number of recipients
What is Spam?
A way of taking a piece of data of any length and representing it in another form that is a fixed length
What is hash?
A team of cyber security professionals that monitors the network and its systems to detect malicious cyber security events
What is a Security Operations Center (SOC)?
A threat actor motivated by satisfaction
Who is a Thrill-Seeker?
Inventor of the World Wide Web
Who is Tim Berners-Lee?
A type of phishing that targets high-position individuals
What is Whaling?
A free and open-source password-cracking tool
What is John the Ripper?
The protocol responsible for resolving hostnames
What is the DNS (Domain Name System)?
Any software designed to perform malicious action on behalf of an attacker
What is Malware?
The state of being protected against the criminal or unauthorized use of electronic data, or measures taken to achieve this.
Uses voice calls for the social engineering attack
When 2 different inputs give the same output
What is Hash Collision?
A security tool, hardware or software that is used to filter network traffic by stopping unauthorized incoming and outgoing traffic.
What is a Firewall?
A threat actor motivated by ideological violence
Who is a terrorist?
A tool to encrypt all traffic leaving and re-entering your machine
What is a VPN (Virtual Private Network)?
Utilized to handle the sending of emails
What is SMTP (Simple Mail Transfer Protocol)?
A lookup table of hashes to plaintexts, so you can quickly find out what password a user had just from the hash
What is a Rainbow Table?
A security solution that collects and analyzes security events to support threat detection, compliance and incident management.
What is SIEM (Security Information And Event Management)?
Used to infect as many systems as possible, encrypting the data on the devices and holding it to ransom.
What is Ransomware?
A form of user interface that allows users to interact with electronic devices through graphical icons and audio indicators
What is a GUI (Graphical User Interface)?
An alternative protocol for receiving emails that downloads emails from the server to a local device
What is POP3 (Post Office Protocol)?
A method of using a cryptographic hashing function to verify the authenticity and integrity of data
What is HMAC?
A network management protocol used on IP networks for automatically assigning IP addresses to devices connected to the network using a client–server architecture.
What is the DHCP (Dynamic Host Configuration Protocol)?
An advanced, sustained cyberattack wherein an intruder establishes undetected presence in a network in order to steal data over a prolonged period of time.
What is an APT (Advanced Persistent Threat)?
Which of our coaches has been improving their Spanish this week?
Who is Kota?