Attacks
Behavior
Data
Threats
Protection
100
A software designed to block computers and files of an enterprise or an individual, until they pay a certain amount.
What ransomware?
100
A browsing way to reduce the possibility of people knowing your online activities.
What is in-private browsing mode?
100
MD5, SHA-1, SHA-512 are examples of such algorithm.
What is a hashing algorithm / hash function?
100
Not typically malicious hacker, who performs ethically or legally questionable acts.
What is a grey hat hacker?
100
A security technology used to prevent anyone in the range of the WIFI network to access the traffic, by encrypting it.
What is Wi-Fi Protected Access 2 (WPA2) encryption?
200
Programs shut off or reconfigure themselves ; incomprehensible network connection issue ; and an unexplainable presence or loss of file are some of them.
What is a Symptoms of Malware?
200
A phase-based attack or stages, used by most attackers to succeed their attacks
What is Kill chain?
200
Ensuring that information was not altered by anyone in any ways from the time it is sent to the time you receive it.
What is data Integrity?
200
A person who uses existing computer scripts or codes to hack into computers, lacking the expertise to write their own.
What is a script kiddie?
200
To know which computer network service are available, an attacker sends a series of messages to known port numbers.
What is port scanning?
300
Attackers create malicious websites and uses optimization tactics to make them look prominent in the search engine.
What is Search Engine Optimization (SEO) poisoning?
300
A network of infected computers, that can be used to lunch a large scare attack.
What is a Botnet?
300
Device that allows storage and retrieval of data from a centralized location by authorized network users.
What is network attached storage (NAS)?
300
It is a global multi-stakeholder and public – private alliance against cyber threats.
What is the International Multilateral Partnership Against Cyber Threats (IMPACT)?
300
Allows notifying a resource provider that the owner of that resource gives the authorization to a third party to access their data.
What is Open Authorization (OAuth)?
400
An attacker gain access to your system and stay there undetected for a long time with the intention to steal information.
What is advanced persistent threats (APTs)?
400
The act of intercepting someone’s information, in the case you are on unsafe network.
What is eavesdropping?
400
Value tied to the content of data, used to validate that the data was not modified during a transfer.
What is a checksum?
400
The behavior of a software or a system, which outputs depends on a sequence or timed events.
What is Race conditions?
400
A type of firewall used to filter which incoming and outgoing network traffic based on situational information.
What is context aware application Firewall?
500
A combination of many simultaneously attacks against different vulnerabilities, that are used to steal financial information of the victims.
What is a Blended Attack?
500
An organization’s investigators team, who oversee all issues related to security.
What is Computer Security Incident Response Team (CSIRT) ?
500
Ensuring that information was not altered by anyone in any ways from the time it is sent to the time you receive it.
What is data Integrity?
500
A commodity dynamic random memory chips vulnerability, that allows the attack to retrieve data from nearby address memory cell.
What is Rowhammer exploit?
500
A network technology that encrypts the data that flows over the intern, whether you connected to it either wired or wirelessly.
What is a Virtual private network (VPN)?
M
e
n
u