Cybersecurity 101
Crack the Code
Who is this email from?
Policies, Plans & Standards
In the News . . . Famous Security Hacks
100

This is the most common password.

What is 123456?

100

RedMane leverages this tool for secure code scanning.

What is GitHub Advanced Security?

100

You should never do this if you receive an email from an unknown sender with links.

What is don’t open it or click any links?

100

This is where RedMane policies, plans and standards are kept.

What is SharePoint?

100

This 2014 hack exposed the personal information of millions of customers of a major US retailer.

What is Target?

200

This protocol is used to secure data transported over the internet?

HTTPs  . . . could accept TLS

200

RedMane leverages this tool for dynamic application scanning.

What is Acunetix (or Invicti)?

200

This type of email involves sending unwanted bulk messages.

What is Spam?

200

This document is RedMane's externally facing policy describing our security practices?

What is the Written Information Security Policy or WISP

200

In 2021, this was the largest attack on infrastructure in the United States where $4.4 Billion Bitcoin ransom was paid to the attackers.

What is Colonial Pipeline?

300

A password called that is only used once.

What is One-Time-Password?

300

This tool helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet.

What is a WAF? (Web Application Firewall)?

300

This attack technique uses human emotions such as greed, love, and anger to cause people to give passwords or money online.

What is Social Engineering?

300

This term refers to any information about health status, provision of healthcare, or payment for healthcare that can be linked to an individual.

[What is Protected Health Information (PHI)?

300

The largest cybersecurity breach in history (Hint: it occurred in 2013).

What is Yahoo?

400

This is the weakest link in Cybersecurity.

Who are people?

400

This type of attack is when a hacker inserts malicious code into a web app input field, allowing them to manipulate or access a SQL database.

What is a SQL Injection?

400

This term refers to the risk of malicious software infiltrating a computer system, often leading to data breaches or system damage.

What is malware?

400

This policy provides RedMane's acceptable use for the social media.

What is the Security Policy for Employees, Contractors, and Consultants or Employee Handbook?

400

This zero-day exploit took the security industry by storm in late 2021 and before an official CVE identifier could be assigned, it became known as Log4Shell.

What is Log4J

500

This principle involves giving users the minimum level of access necessary to perform their jobs.

What is Least Privilege?

500

This type of attack enables attackers to inject client-side scripts into web pages viewed by other users.

What is Cross-site Scripting?

500

This type of malware disguises itself as legitimate software.

What is a trojan horse?

500

RedMane develops systems consistent with the security and privacy controls in national standard.

What is the NIST 800-53 framework?

500

Pavel Durov, the CEO of this encrypted app was recently arrested in France for not preventing crime occurring on the platform.

What is Telegram?
M
e
n
u