Alphabet Soup (Acronyms)
Malware Menagerie
Web Woes
Defensive Maneuvers
Club Facts
100

What does "CIA" stand for in the context of information security?

Confidentiality, Integrity, and Availability

100

This type of malware encrypts a victim's files and demands payment for the decryption key.

Ransomware

100

The "S" in HTTPS stands for this, indicating that your connection to the website is encrypted.  

Secure

100

This digital "wall" sits between a trusted internal network and an untrusted external network, monitoring and filtering traffic.

A Firewall

100

What day, time, and location are our weekly club meetings held?

Monday evenings at 5pm in ET007(A-B)

200

What does "DNS" stand for, the system often called the "phonebook of the internet"?

Domain Name System

200

A piece of malware that disguises itself as a legitimate program. 

A Trojan Horse

200

This vulnerability allows an attacker to read arbitrary files on the server by using sequences like ../ to navigate the file system.

Directory Traversal (or Path Traversal)

200

This popular open-source tool allows you to capture and interactively browse the traffic running on a computer network.

Wireshark

200

Name one of the executive board members of the club.

President:@Noah Pumphrey
Vice President:@Noah H
Treasurer:@haik
Event Coordinator:@KB - Kaleb
Secretary:@Chris P Chicken - Nithish

300

Abbreviated as "CSRF," this web attack tricks a victim's browser into making an unwanted request to a site where they are already authenticated.

Cross-Site Request Forgery

300

This type of malware operates with the highest level of operating system privilege to hide its presence from detection.

A Rootkit

300

This dangerous vulnerability, abbreviated "____-Side Request Forgery," allows an attacker to force requests to internal resources that are not normally accessible from the internet.

Server

300

This foundational security principle involves layering multiple, different security controls so that if one fails, another is there to stop an attack.

Defense in Depth

300

What major competition or event did our club participate in last year?

National Cyber League (NCL) and CyberRange

400

This U.S. government agency, abbreviated as "NIST," provides cybersecurity frameworks and standards, including the famous CSF

National Institute of Standards and Technology

400

What term describes malware that can constantly change its own code and signature files to evade detection by traditional antivirus software?

Polymorphic Malware

400

Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

Insider Threats

400

An Intrusion Detection System (IDS) becomes this when it is given the ability to not just detect but also actively block malicious network traffic.

An Intrusion Prevention System (IPS)

400

Best place to ask questions about anything club-related or cybersecurity focused? 

Our Discord and/or at the meetings: 

https://discord.gg/5ZwW8g2CKF

500

This vulnerability allows an attacker to inject malicious scripts into a trusted website, which then run in the victim's browser.

Cross-Site Scripting

500

This is a type of malicious software that exists only as a process in the computer's memory (RAM) rather than as a file on the hard drive. This makes it extremely difficult for traditional antivirus programs to detect.

Fileless Malware

500

Any combination of your name, your home address or phone number, credit card or account numbers or social security number.

PII (Personally Identifiable Information)

500

This is a decoy computer system set up to attract and trap attackers, allowing defenders to study their methods. 

A honeypot

500

Who is the faculty advisor for the cybersecurity club?

Clay Hampton - @ctrlnet - cthampto@purdue.edu

M
e
n
u