Annoying Acronyms
Fun Stuff
Malware
Email Fun
Phishing
100

This acronym stands for the malicious practice where attackers seek to compromise digital data by intercepting communications between two parties without their knowledge.

What is MITM? (Man In The Middle)

100

This type of cyber threat sounds like it might be aquatic but is actually a type of malware that fraudulently gains control of your computer.

What is a Trojan? (Trojan horse)

100

This type of malware is designed to replicate itself from one computer to another, spreading infection.

What is a virus?

100

This type of security attack involves sending unsolicited messages to many people at once, often for phishing purposes.

What is Spam?

100

This term refers to deceptive attempts, usually through email, to obtain sensitive information by pretending to be a trustworthy entity.

What is phishing?

200

This acronym refers to a security discipline focused on protecting computer systems and networks from disruption or unauthorized access within a company

What is IAM? (Identity and Access Management)

200

Named after a creature from Greek mythology, this type of attack occurs when data or commands are inserted into a program or system to exploit vulnerabilities in the parsing of input.

What is SQL Injection?

200

Often disguised as legitimate software, this type of malware gains access to systems while appearing harmless, only to reveal its true malicious intent later.

What is a Trojan horse?

200

This common method involves the use of 'masking' to make links appear as though they are from legitimate sources.

What is Spoofing?

200

Phishing attempts that are directed at specific individuals with access to sensitive information are known as this.

What is spear phishing?

300

 Often used in discussions about preserving confidentiality, integrity, and availability of information, this acronym is fundamental in security policies.

What is CIA? (Confidentiality, Integrity, and Availability)

300

This superhero-sounding tool is favored by many network administrators to remotely control systems as part of their management tasks.

What is PowerShell?

300

This malware is designed to encrypt the victim's data, demanding payment in exchange for the decryption key.

What is ransomware?

300

Often used in cryptography, what process transforms readable data into a scrambled, encoded format?

What is Encryption?

300

This type of phishing involves voice communication.

What is vishing?

400

This type of software is abbreviated as IDS and is used to detect unauthorized access or policy breaches in a network.

What is IDS? (Intrusion Detection System)

400

This technique sounds like you're fishing in a river, but in reality, you're attempting to trick someone into giving away sensitive information.

What is Phishing?

400

This term refers to software specifically designed to detect, stop, and remove viruses and other kinds of malware.

What is antivirus software?

400

This type of secure browsing encrypts the connection between your browser and the web server.

What is HTTPS?

400

This is the term for a phishing attack that uses text messages to lure victims into revealing personal information.

What is smishing?

500

This term refers to an agreement which quantifies the security service expectations between a service provider and client, abbreviated as SLA.

What is SLA? (Security Level Agreement) or (Service Level Agreement)

500

Often confused with the sweet treat, this cybersecurity attack blocks access to key digital services until a ransom is paid.

What is Ransomware?

500

This sophisticated type of malware was discovered in 2010 and is believed to have been developed jointly by the United States and Israel to disrupt Iran's nuclear efforts.

What is Stuxnet?

500

A digital version of a physical key, this piece of hardware provides secure and convenient authentication for devices.

What is a Security Token?

500

This phishing technique involves the attacker inserting themselves into an existing conversation between two parties to intercept information

What is man-in-the-middle phishing?

M
e
n
u