This is the minimum recommended length for a strong password.
What is 12 characters?
This fraudulent practice involves sending emails that appear to be from reputable sources to steal sensitive information.
What is phishing?
This type of malicious software replicates itself and spreads to other computers.
What is a virus or worm?
This security system monitors and controls incoming and outgoing network traffic based on predetermined rules.
What is a firewall?
Every group selected this option as an authentication method for entering the school.
What is smart card authentication?
This type of attack tries every possible combination of characters to crack a password.
What is a brute force attack?
This practice involves creating copies of important data to prevent loss from attacks or hardware failure.
What is backing up data or creating backups?
This malware encrypts your files and demands payment for the decryption key.
What is ransomware?
This protocol encrypts web traffic and is indicated by a padlock icon in your browser.
What is HTTPS (HTTP Secure) or SSL/TLS?
Everyone learned about this choice piece of clothing that Mr. P wears through a very questionable query posed by a student.
What is an undershirt?
This authentication method requires two different forms of verification to access an account.
What is two-factor authentication (2FA) or multi-factor authentication (MFA)?
You should do this regularly to ensure your software has the latest security patches.
What is updating or patching software?
This type of malware disguises itself as legitimate software but contains malicious code.
What is a Trojan horse or Trojan?
This tool can be used to read inside the contents of packets
What is wireshark?
The class established that as a group they would be highly effective at performing this illegal activity.
What is robbing a bank?
This technique uses a list of commonly used passwords to attempt unauthorized access.
What is a dictionary attack?
This type of information should never be shared on social media as it can be used to answer security questions or steal your identity.
What is personal information (e.g., birthdate, address, phone number, mother's maiden name)?
This attack floods a network or server with traffic to make it unavailable to users.
What is a DDoS (Distributed Denial of Service) attack?
This set of rules dictates how devices speak to one another with a specific service - usually including specific ports
What are protocols?
During each class there is an apparent rip in the space/time continuum where we agree to a specific amount of time, but some take advantage and go way beyond that ಠ_ಠ
What is 5 minutes?
This cryptographic function converts passwords into fixed-length strings and is designed to be slow to prevent brute force attacks.
What is a password hashing algorithm (e.g., bcrypt, Argon2)?
This practice involves attackers gathering information about targets from their social media profiles to craft convincing phishing attacks or impersonate them.
What is social media reconnaissance or OSINT (Open Source Intelligence)?
This sophisticated malware can hide its presence by modifying operating system functions and is extremely difficult to detect.
What is a rootkit?
It is incredibly important to perform this on sensitive information, otherwise someone could intercept and read the contents of packets in clear text.
What is encryption?
We performed some OSINT on this individual in class including reviewing their Instagram posts and Zillow.
Who is Tony Stark?