This term refers to a type of cyberattack where an attacker attempts to gain unauthorized access to a system by repeatedly trying different password combinations.
What is a brute force attack?
This data protection regulation, enacted in the European Union, is known for its strict rules regarding the handling of personal data.
What is GDPR (General Data Protection Regulation)?
In this 1995 film, a computer hacker helps bring down a rogue AI that threatens humanity.
What is "Hackers"?
This term refers to the deliberate spreading of false or misleading information to deceive and manipulate individuals, often used as a cyber warfare tactic.
What is disinformation?
This is the secure coding practice of ensuring that input data is properly validated and sanitized to prevent security vulnerabilities.
What is input validation?
This is the practice where an organization sets up a fake environment to deceive and divert attackers away from the real network.
What is a honeypot?
This federal law in the United States requires organizations to notify individuals of data breaches involving their personal information.
What is the Health Insurance Portability and Accountability Act (HIPAA)?
This critically acclaimed TV series known for its portrayal of hacking and cybersecurity, the protagonist, Elliot Alderson, is a cybersecurity expert and vigilante hacker.
What is "Mr. Robot"?
This organization, founded in 1947, provides cybersecurity expertise and collaborates with government agencies and private sector companies to mitigate cyber threats.
What is the NSA (National Security Agency)?
In secure coding, This is the term for a vulnerability that occurs when an application does not properly handle or sanitize user-supplied data, potentially allowing attackers to execute malicious code.
What is a code injection vulnerability (e.g., SQL injection or OS command injection)?
This is the term for the act of convincing individuals to disclose sensitive information by pretending to be a trusted entity.
What is social engineering?
Under the GDPR, organizations may be required to appoint this role, responsible for ensuring compliance with the regulation and serving as a point of contact for data subjects and authorities.
What is the Data Protection Officer (DPO)?
In this 1999 novel by Neal Stephenson, a computer hacker and a cryptographer investigate a conspiracy involving classified information.
What is "Cryptonomicon"?
This U.S. government agency serves as a hub for collecting and sharing cybersecurity threat information.
What is CISA (Cybersecurity and Infrastructure Security Agency)?
This is the practice of regularly reviewing and analyzing source code to identify and fix security vulnerabilities?
What is code review or static analysis?
This is the term for a piece of code or software that appears to be legitimate but is actually malicious and performs harmful actions on a system, often without the user's knowledge.
What is a Trojan horse or Trojan?
This regulation, enacted in California, grants consumers the right to request that a business delete their personal information and not sell it.
What is the California Consumer Privacy Act (CCPA)?
This 1983 film starring Matthew Broderick features a young computer whiz who accidentally hacks into a military supercomputer.
What is "WarGames"?
In the context of cyber threat intelligence, this is the term for information that identifies specific tactics, techniques, and procedures (TTPs) used by cyber adversaries to carry out attacks.
What are Indicators of Compromise (IOCs)?
This widely recognized and secure coding guideline consists of a set of best practices designed to prevent security vulnerabilities in software development.
What is the OWASP Top Ten?
This term refers to the deliberate practice of sending targeted deceptive emails or messages that appear to come from a trustworthy source to trick individuals into revealing sensitive information or taking malicious actions.
What is spear phishing?
Under the GDPR, this is the maximum fine that can be imposed on organizations for the most serious violations, such as data breaches and failure to obtain proper consent.
What is €20 million or 4% of the company's global annual revenue, whichever is higher?
This is a cybersecurity-themed techno-thriller novel by William Gibson, often credited with popularizing the term "cyberspace"?
What is "Neuromancer"?
This intelligence collection method involves gathering information about cyber threats from publicly available sources, such as news articles, blogs, and social media, to analyze and anticipate potential risks.
What is Open Source Intelligence (OSINT)?
In secure coding, this is the principle that advocates that "the security of a system should not depend on the secrecy of the design or implementation" and encourages transparency about security mechanisms and protocols.
What is Kerckhoffs's Principle (also known as Shannon's Principle)?