A person who is extremely skilled with computers and technology.
What is a hacker?
A deceptive email intended to gather information from the recipient.
What is phishing?
A piece of software that is harmful to the end user.
What is malware?
Something harmful, damaging, or tricking.
What does malicious mean?
The sending of secret messages that only certain people can read.
What is Cryptography?
The type of hackers your mentors are.
Exploitation of psychology to gain access to sensitive information.
What is social engineering?
A program that pretends to be useful or helpful but is actually malware.
What is a Trojan Horse?
A malicious attempt made by a hacker to access, damage, or destroy information
What is a Cyber Attack?
The name of one way encryption.
What is hashing?
A hacker who hacks into a server to steal pictures of cats.
What is a Blackhat hacker? (grey hat is also acceptable as the actions are not explicitly malicious in this example.)
The creation of a fake believable story to assist in social engineering.
What is pretexting?
Phishing Sites, Popups, Email Attachments, etc...
What are the origins of malware?
The constant guessing of passwords through an automated process to eventually guess the password.
What is a brute force attack?
A cipher that does not change letters and but puts them into columns to change their order.
What is a Columnar Transposition Cipher?
The three kinds of Hackers.
What is Blackhat, Greyhat, and Whitehat?
Public information that a hacker can use for reconnaissance.
What is OSINT(open source intelligence)?
Who is Bonzi Buddy?
An attack that overwhelms a server with internet traffic.
What is a DDoS(Distributed Denial of Service) Attack?
A Cipher that turns letters into numbers and then does math with those numbers.
What is Affine Cipher?
A model that lays out the stages of a Cyber Attack
What is the Cyber Kill Chain?
Ninety-Eight percent (98%).
What amount of Cyber attacks rely on social engineering?
The six types of Malware.
What are Virus, Worm, Trojan, Spyware, Adware, Ransomware?
An attack made through a vulnerability previously unknown by the developers.
What is a Zero-Day Attack?
A type of one-way encryption.
What is SHA-256