In this 1998 thriller, Will Smith's character becomes the target of a government conspiracy after unknowingly obtaining incriminating evidence on a U.S. official, with the help of a reclusive ex-NSA operative
What is Enemy of the State?
This cyber attack targeted Iranian nuclear facilities in 2010 using a highly sophisticated worm that infected industrial control systems, specifically aimed at sabotaging uranium centrifuges
What is Stuxnet?
This command is used to create a new directory in Linux
What is mkdir?
This well known service usually is on Port 443
What is https?
This identity and access management security method requires two forms of identification to access resources and data
What is MFA/2FA?
This 1983 film features a young hacker who accidentally accesses a U.S. military supercomputer and almost starts World War III by playing what he believes is a video game
What is WarGames?
Hackers were able to get into this big-name company’s credit card information through their HVAC system
What is Target?
On Debian based Linux Distros, this command is used to install new packages
What is apt or apt-get?
This model consists of 7 layers and describes the communication of computer systems on a network
What is the OSI model?
This type of phishing targets specific individuals within an organization using personal details to make the attack more convincing, often bypassing generic spam filters.
What is Spear Phishing?
This cryptographer and mathematician cracked the German Enigma code during World War II
Who is Alan Turing?
This notorious hacker and author of the book “Ghost in the Wires”, is known for breaking into government and corporate systems
Who is Kevin Mitnick?
This Linux command-line utility is used for searching plaintext datasets for lines that match a regular expression
What is grep?
This device connects multiple network components such as computers, printers, & servers, and forwards data packets directly between them utilizing MAC addresses
What is a Switch?
A 3-way handshake uses this type of encryption
What is Asymmetric encryption?
The tool used by Trinity in The Matrix to make it seem like she is hacking
What is nmap?
In 2014, this entertainment company was hacked by a group called the "Guardians of Peace," allegedly in retaliation for releasing a controversial film, leading to massive leaks of internal emails and unreleased films
What is Sony or Sony Pictures?
This symbol represents the current user’s home directory in a Linux shell
What is ~ (tilde)?
This system is designed to detect and respond to potential security breaches within a network
What is an intrusion prevention system (IPS)?
This framework is commonly used to describe the behavior, tactics, techniques, and procedures of cyber adversaries
What is the MITRE ATT&CK Framework?
This hacking collective, famous for public cyber attacks against entities they view as corrupt, initiated "Operation Payback," targeting financial institutions in support of WikiLeaks after it was cut off from donations
What is anonymous?
In 2016, while in the middle of a significant acquisition, this tech giant acknowledged suffering multiple massive data breaches…the first of which took place three years prior. 3.5 billion user accounts we compromised
What is Yahoo?
This command-line utility allows users to schedule jobs to run at specific times, dates, or intervals on Unix-like operating systems. Because of the complexity of the syntax used, it can be easily misconfigured
What is cron?
This subnet mask “0/24” translates to this subnet
What is 255.255.255.0?
On a scale of 1-10 in the looks department, you're a 5 at best. While attending a conference in Hong Kong, you're getting unusual attention from a 10 at the conference hotel bar. You're probably an unwitting victim of this type of operation
What is a Honeypot?