99.999
Threats
CIA
Misc
Data States
100

Maximum yearly downtime of a service which claims 99.999% uptime.

What is 5.26 minutes?

100

Device or tool which captures and analyzes the traffic of a given network.


What is a packet sniffer?

100

Map of users or groups to permissions.


What is an ACL (Access Control List)?

100

Technology which allows users to gain access to application software and databases. Cloud providers manage the infrastructure. Users store data on the cloud provider’s servers.


What is Software as a Service (SaaS)

100

The state data is in during initial input, modification, computation, or output .

What is data processing?

200

Systems created to duplicate organization data, configuration data and personal data ensures system availability, in order to quickly restore it in an outage or attack scenario

What is a BackUp system?

200

Policy which makes enterprises not responsible for providing, and therefore securing, the devices their employees use at work


What is "Bring Your Own Device"(BYOD)?

200

Measures put in place to keep track of user activities: What they access, what they try to access, how long they use a resource, changes they make


What is accounting?

200

A security policy component that defines what users can and cannot do on the various system components (e.g. what websites the can or not visit on the company network). 

What is acceptable use policy (AUP)?

200

Multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk.


What is a Redundant array of independent discs (RAID)?

300

The act of grouping multiple devices together to provide a service that appears to be a single entity to a user. If one device fails, the other devices remain available.

What is clustering?

300

A person who uses existing computer scripts or codes to hack into computers, lacking the expertise to write their own.


What is a script kiddie?

300

Value tied to the content of data, used to validate that the data was not modified during a transfer

What is a checksum?

300

An information security standard published in 2005 and revised in 2013. most commonly used for implementing information security worldwide.

What is ISO 27000?

300

The two leading providers of cloud storage in the world.

What are AWS & Azure?

400

Fail-over mechanism which is active and connected, ready to be switched in in case a main component fails.

What is a hot spare/ hot standby?

400

Attack on a DNS server, redirecting traffic to a machine picked by the attacker.


What is DNS Spoofing?

400

The current director of the CIA.


Who is Mike Pompeo?

400

Exploit of the SMB protocol on Microsoft machines, allegedly created by the NSA


What is ETERNALBLUE?

400

Technical term for one's ability to use removable media to physically move data from one computer to another.

What is sneaker net?

500

Software tool developed by Netflix to test the resilience of their fleet by randomly shutting down machines

What is chaos monkey?

500

A software application that examines activities on host systems only. It generates log files and alarm messages when it detects unusual activity. A system storing sensitive data or providing critical services can be a good candidate to that service.

What is Host-based intrusion detection systems (IDS)

500
Checking the user's identity to prevent unauthorized access. If they have the right to access, check and give them access to the resources they have the privilege to get. After that, you can audit the system (keep track of the users did on it)  

What is Authentication, Authorization and Accounting (AAA). 

500

Malicious worm, famous for having attacked Iran's nuclear reactors


What is Stuxnet?

500

A way to measure the consistency of a collection of data (a file, a picture, or a record), by performing a process called a hash function to take a snapshot of that data at an instant in time to unsure that it was not changed.

What is Integrity Checks.
M
e
n
u