Attackers be like...
Bits, Bytes & Bites
Ctrl+Alt+Defend
The Governance Games
The Login Olympics
100

A type of attack that tricks users into revealing credentials via fake emails or messages.

What is phishing?

100

This 3-letter term for a software flaw sounds like an uninvited guest at a summer picnic.

What is a bug?

100

Regular training to help recognize phishing emails and social engineering attempts.

What is security awareness training?

100

CIA triad.

What is Confidentiality, Integrity, and Availability?

100

An authentication method requiring two or more different verification factors.

What is Multi-Factor Authentication (MFA)?

200

A method of systematically trying many password combinations until the correct one is found.

What is a brute-force attack?

200

This attack consists of intercepting data between two people who think they are talking directly to each other.

What is a Man-in-the-Middle (MitM) attack?

200

The process of converting information into an unreadable format to protect it.

What is encryption?

200

You should never plug one of these 'found' items into your work computer, as they can be pre-loaded with malware that installs automatically.

What is a USB Drive?

200

The users only have the access strictly necessary to perform their job.

What is least privilege principle?

300

The 2017 global ransomware attack that affected hospitals and companies via a Windows vulnerability.

What was WannaCry?

300

This 'sweet' term refers to a computer system set up as a decoy to lure in hackers so security teams can study their methods.

What is a honeypot?

300

The process of identifying, evaluating, and prioritizing security risks.

What is risk management?

300

Dividing a network to limit lateral movement of attackers.

What is network segmentation?

300

Security model that assumes no user or device should be trusted by default, even inside the corporate network.

What is Zero Trust?

400

This attack involves injecting malicious scripts into web pages viewed by other users.

What is Cross-Site Scripting (XSS)?

400

This attack uses AI to create highly convincing fake audio, video, or images that impersonate individuals for malicious purposes.

What is deep fake?

400

The concept of using multiple security controls together so that if one fails, others still provide protection.

What is defense in depth?

400

Simulating controlled attacks to identify vulnerabilities before real attackers do.

What is penetration testing (pen testing)?

400

An attack where an attacker gains higher access rights than originally granted.

What is privilege escalation?

500

An attack that injects malicious code into a web application's input fields to manipulate a database.

What is SQL injection?

500

A type of attack where malicious code is hidden inside legitimate software updates or third-party components.

What is a supply chain attack?

500

The plans to maintain (or recover) the service online in case of disaster, interruption, or malfunction.

What are SCP and DRP?

500

A control that restricts responsibilities among different individuals to prevent conflicts of interest.

What is Segregation of Duties (SOD)?

500

This flaw occurs when a system fails to properly enforce user permissions, allowing an attacker to access unauthorized data or functionality.

What is Broken Access Control?

M
e
n
u