The practice of protecting systems, networks, and programs from digital attacks.
What is cybersecurity?
The first phase of the incident response process where systems are monitored for suspicious activity.
What is detection and analysis?
A centralized location where security analysts monitor and respond to security events.
What is a Security Operations Center (SOC)?
Did you Say SIEM? :)
The science of collecting, analyzing, and preserving digital evidence for legal investigations.
What is digital forensics?
The largest planet in our solar system.
What is Jupiter?
A technique where attackers inject malicious SQL code into a query to manipulate databases.
What is SQL injection?
A documented set of procedures designed to detect, respond to, and recover from a cybersecurity incident.
What is an incident response plan?
A log management system often used in SOCs to collect and analyze security data.
What is a SIEM (Security Information and Event Management)?
A common file system used in Windows operating systems that forensic analysts often examine.
What is NTFS (New Technology File System)?
This animal is known as the "king of the jungle" but actually lives in the savannah.
What is a lion?
The act of using multiple authentication methods to verify a user's identity.
What is multi-factor authentication (MFA)?
The process of determining the extent, cause, and impact of a security breach.
What is incident analysis?
A technique used by SOC analysts to find patterns in large datasets to detect anomalies.
What is data correlation?
The technique used to recover deleted files from a storage device.
What is file carving?
A popular cartoon character who lives in a pineapple under the sea.
Who is SpongeBob SquarePants?
A type of malware that encrypts data and demands payment for the decryption key.
What is ransomware?
The phase where affected systems are restored and brought back online after an incident.
What is recovery?
An alert generated when a security tool detects an event that resembles a threat but is not malicious.
What is a false positive?
A tool widely used to create forensic disk images for analysis.
What is FTK Imager?
Or as you said Autopsy.
The food that mysteriously tastes better at 2 AM than any other time of the day.
What is أندومي?
A widely used framework for assessing cybersecurity risks and controls in organizations.
What is the NIST Cybersecurity Framework?
An analysis conducted after incident resolution to identify lessons learned and improve future responses.
What is a post-incident review (PIR)?
A methodology used to investigate security incidents based on event correlation and threat intelligence.
What is threat hunting?
A process where a file's hash value is calculated to verify its integrity during a forensic investigation.
What is hashing?
A Cybersecurity firm established by Aramco to enhance cybersecurity solutions and digital transformation.
What is Cyberani by Aramco Digital?