Types of Cyber Attacks
Types of Authentication
Data Encryption
Authorization and Accounting
Random Trivia
100

Convincing a victim that they are performing a legitimate task when, in fact, they are being tricked into revealing sensitive information on their computer.

Browser Attack

100

A type of authentication that requires the user to provide something that they know, such as a password or PIN.

Type 1 Authentication

100

The process of encoding or translating data into another form so that only the intended recipient can decrypt and read the data.

Data Encryption

100

Keeping a detail list of events.

Logging

100

This is a color is an banana.

Yellow

200

An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.

Password Attack

200

Authentication that requires two or more evidences of authentication, usually of different types.

Multi Factor Authentication

200

A form of encryption that uses only one key to encrypt and decrypt a file.

Symmetric Encryption

200

Keeping track of who does what on a computer or network.

Accounting

200

This sea creature has three hearts and blue blood, thanks to its copper-based circulatory system.

Octopus

300

Another kind of digital attack that can be used to steal information from a user.

Social Engineering

300

A method of authenticating with one system to gain access to other related systems.

Single Sign-on 

300

A way for two computers to verify their identity before they exchange information.


Security Certificate

300

Modifies the ACL based on pre-configured rules. Role-based access control systems grant permissions to users based on each user's role.

Role-based access control (RBAC)

300

This planet has a day that is longer than its year, with a rotation taking 243 Earth days.

Venus

400

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

Man-in-the-Middle Attack

400

A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face, or voice.

Type 3 Authentication

400

The thing that encrypts HTTP

SSL

400

If someone is caught trespassing on a network or stealing data, the person will probably deny it.

Non-repudiation

400

French fries are from this country.

Belgium

500

An attempt to connect to a server by capturing and resending authentication information.

Replay Attack

500

A type of authentication that requires the user to provide something that they have, such as a key fob, electronic chip, or smart card.

Type 2 Authentication

500

A protocol used to encrypt emails. It allows the sender to digitally sign and encrypt emails.

S/MINE  (Secure/Multipurpose Internet Mail Extensions)

500

Uses security clearance levels to specify the users who can access designated resources. It is also a rule-based control system.

Mandatory access control (MAC)

500

Won the college football playoff last year.

Michigan

M
e
n
u