IT&Sec Movies/Shows
AppSec
Security Acronyms
Are you smarter than a CISSP
DFIR
100

Early 90's film with the catch phrase "Hack the Planet"

Hackers

100

These words make up the OWASP acronym

Open Web Application Security Project

100

DLP

Data Loss Prevention

100

Organization need to periodically test disaster recovery and business continuity plans despite proving they work due to

Environmental changes that may render them ineffective over time.

100

This operational team houses information security professionals responsible for monitoring and analyzing the organization's security posture on an ongoing basis

Security Operations Center or SOC or CSOC

200

TV show known for a popular meme "Hello IT, Have you tried turning it off and on again"

The IT Crowd

200

This is the 1st most critical web application vulnerability according to the OWASP Web Top 10 - 2017

Injection 

200

EDR

Endpoint Detection and Response

200

What commonly takes place when you insert specially crafted and excessively long data into an input field?

Buffer Overflow

200

These discussion-based exercises bring different team members to meet in an informal, classroom setting to discuss their roles during an emergency and their responses to a particular emergency situation

Table-Top Exercises

300

An improvised line used when the printer on scene displayed "PC Load Letter"

Office Space

300

This is a popular open-source web application firewall

Mod Security

300

GRC

Governance, Risk Management, and Compliance

300

An site that has all necessary PCs, servers, and telecommunications in a ready state

hot-site

300

This modeling procedure is used for optimizing security by identifying objectives and vulnerabilities, defining countermeasures to prevent, or mitigate the effects of, threats  to an asset

Threat Modeling

400

"Follow the white rabbit"

The Matrix

400

This is a form of black box testing that works by providing invalid, unexpected or random data

Fuzzing

400

PCI-DSS

Payment Card Industry Data Security Standard

400

Alice wants to send an email to Bob, who is several network hops away from her. What is the best approach to protecting the confidentiality of the message

S/MIME or Secure Multipurpose Internet Mail Extensions 

400

This is the term/abreviation typically used to 'profile' a bad actor

TTPs or Tactics (Tools), Techniques and Procedures

500

"I'm not hiring him, he uses spaces not tabs"

Silicon Valley

500

This is a authentication token commonly used for stateless sessions

JSON Web Token

500

(ISC)²

International Information Systems Security Certification Consortium

500

To make a copy of an object and modify the attributes of the second copy

Polyinstantiation

500

This phase of the incidence response lifecycle involves using 'break-glass' procedures to access admin/root accounts to verify and check access levels and activity across the system

Containment, Eradication and Recovery

M
e
n
u