CIA
99.999
Data States
Threats
Misc
100
Map of users or groups to permissions
What is an ACL (Access Control List)?
100
Maximum yearly downtime of a service which claims 99.999% uptime
What is 5.26 minutes?
100
The state data is in during initial input, modification, computation, or output
What is data processing?
100
Not typically malicious hacker, who performs ethically or legally questionable acts
What is a grey hat hacker?
100
Technology which allows users to gain access to application software and databases. Cloud providers manage the infrastructure. Users store data on the cloud provider’s servers.
What is Software as a Service (SaaS)
200
Measures put in place to keep track of user activities: What they access, what they try to access, how long they use a resource, changes they make
What is accounting?
200
Systems created to duplicate organization data, configuration data and personal data ensures system availability, in order to quickly restore it in an outage or attack scenario
What is a BackUp system?
200
Device that allows storage and retrieval of data from a centralized location by authorized network users
What is network attached storage? (NAS)
200
Device or tool which captures and analyzes the traffic of a given network.
What is a packet sniffer?
200
A secure virtual network which encrypts the packets sent through it
What is a VPN?
300
MD5, SHA-1, SHA-512 are examples of such algorithm
What is a hashing algorithm / hash function?
300
The act of grouping multiple devices together to provide a service that appears to be a single entity to a user. If one device fails, the other devices remain available.
What is clustering?
300
multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk.
What is a Redundant array of independent discs (RAID)?
300
Policy which makes enterprises not responsible for providing, and therefore securing, the devices their employees use at work
What is "Bring Your Own Device"(BYOD)?
300
An information security standard published in 2005 and revised in 2013. most commonly used for implementing information security worldwide.
What is ISO 27000?
400
Value tied to the content of data, used to validate that the data was not modified during a transfer
What is a checksum?
400
Failover mechanism which is active and connected, ready to be switched in in case a main component fails
What is a hot spare/ hot standby?
400
The two leading providers of cloud storage in the world
What are AWS & Azure?
400
A person who uses existing computer scripts or codes to hack into computers, lacking the expertise to write their own.
What is a script kiddie?
400
Exploit of the SMB protocol on Microsoft machines, allegedly created by the NSA
What is ETERNALBLUE?
500
The current director of the CIA.
Who is Mike Pompeo?
500
Software tool developed by Netflix to test the resilience of their fleet by randomly shutting down machines
What is chaos monkey?
500
Technical term for one's ability to use removable media to physically move data from one computer to another
What is sneaker net?
500
Attack on a DNS server, redirecting traffic to a machine picked by the attacker
What is DNS Spoofing?
500
Malicious worm, famous for having attacked Iran's nuclear reactors
What is Stuxnet?
M
e
n
u