This framework maps cyber-adversary behaviors across phases like Initial Access and Lateral Movement.
What is MITRE ATT&CK?
This standard allows identity providers to pass authentication and authorization data to service providers, commonly used for SSO.
What is SAML?
This technique is used to slow down bot traffic
What is Rate-limiting?
Customers can contact customer service through these two channels
What are Phone and Chat?
What is the closest star to us?
What is The Sun?
Frequently analyzed in U.S. Cyber Command and ODNI threat assessments, these four nation-states form the core set of strategic cyber adversaries—each known for distinct tradecraft, including supply-chain compromises, destructive wiper malware, election interference, and cryptocurrency-driven operations to evade sanctions.
Who are Russia, China, Iran, and North Korea?
This principle states that a user should have the minimum access necessary to perform their job.
What is least privilege?
This is the first stage of an attack
What is Recon/Enumeration?
This application was built to replace Oracle, saving more than $5 million.
What is Kohl's 360?
This mighty river carved the Grand Canyon
What is the Colorado River?
This highly sophisticated malware campaign, discovered in 2010, is often cited in CTI as the first known cyber operation to cause physical destruction, targeting industrial control systems in Iran’s nuclear program.
What is Stuxnet?
The holiday workshop implemented hardware security keys for staff. This form of authentication is resistant to phishing attacks.
What is FIDO2/WebAuthn/Yubikey?
This popular test is intended to differentiate humans from bots
What Is Captcha?
Customer service agents are projected to take over 750K calls and 666K inquiries from this contact method during peak season
What is Chat?
This person wrote the poems in A Light in the Attic and Where the Sidewalk Ends
Who is Shel Silverstein?
This social-engineering–heavy threat actor group, known for SIM swapping, MFA fatigue attacks, and targeting help desks for initial access, has been linked to high-profile breaches across hospitality, retail, and entertainment industries.
Who is Scattered Spider (a.k.a. Octo Tempest / UNC3944)?
This type of attack attempts billions of login combinations using stolen password datasets.
What is credential stuffing/password spraying?
The SSG uses this tool to intercept, inspect, and modify HTTP requests to find vulnerabilities
What is Burp?
Chat servicing was migrated off of Ada to this provider, creating annual savings of $700K.
What is Genesys?
Brazil’s capital city, Brasilia, was designed to look like what on a map?
What is an airplane?
This adversary-modeling framework characterizes threat actors based on observable behaviors, including their tradecraft, infrastructure, and attack patterns, rather than attribution alone.
What is the Diamond Model?
This protocol, built on top of OAuth 2.0, adds identity information via ID tokens.
What is OpenID Connect (OIDC)?
This prevents unapproved sites and Javascript from being injected into our webstore pages, and helps prevent Magecart-like attacks
What is Content Security Policy - CSP ?
Customer service agents can obtain payment information from customers to place orders for them using what technology
What is IVR?
The Great Lakes form part of our border with Canada. Name all five of them.
Huron, Ontario, Michigan Erie and Superior