Convincing a victim that they are performing a legitimate task when, in fact, they are being tricked into revealing sensitive information on their computer.
Browser Attack
A type of authentication that requires the user to provide something that they know, such as a password or PIN.
Type 1 Authentication
The process of encoding or translating data into another form so that only the intended recipient can decrypt and read the data.
Data Encryption
Keeping a detail list of events.
Logging
This is a color is an banana.
Yellow
An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.
Password Attack
Authentication that requires two or more evidences of authentication, usually of different types.
Multi Factor Authentication
A form of encryption that uses only one key to encrypt and decrypt a file.
Symmetric Encryption
Keeping track of who does what on a computer or network.
Accounting
This sea creature has three hearts and blue blood, thanks to its copper-based circulatory system.
Octopus
Another kind of digital attack that can be used to steal information from a user.
Social Engineering
A method of authenticating with one system to gain access to other related systems.
Single Sign-on
A way for two computers to verify their identity before they exchange information.
Security Certificate
Modifies the ACL based on pre-configured rules. Role-based access control systems grant permissions to users based on each user's role.
Role-based access control (RBAC)
This planet has a day that is longer than its year, with a rotation taking 243 Earth days.
Venus
An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
Man-in-the-Middle Attack
A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face, or voice.
Type 3 Authentication
The thing that encrypts HTTP
SSL
If someone is caught trespassing on a network or stealing data, the person will probably deny it.
Non-repudiation
French fries are from this country.
Belgium
An attempt to connect to a server by capturing and resending authentication information.
Replay Attack
A type of authentication that requires the user to provide something that they have, such as a key fob, electronic chip, or smart card.
Type 2 Authentication
A protocol used to encrypt emails. It allows the sender to digitally sign and encrypt emails.
S/MINE (Secure/Multipurpose Internet Mail Extensions)
Uses security clearance levels to specify the users who can access designated resources. It is also a rule-based control system.
Mandatory access control (MAC)
Won the college football playoff last year.
Michigan