Data Analysis and Security Threats
Authentication
Data Encryption (and Security Threats)
Device Security and Business Continuity
Obscure Superheroes/Villains
100

The process of turning data points into useful information.

What is Data Analytics?

100

The process of keeping track of user activity while attached to a system.

What is Accounting?

100

The process of encoding or translating data into another form so that only the intended recipient can decrypt and read the data.

What is Data Encryption?

100

Software that helps protect against malicious software infections.

What is Anti-Malware Software?

100

This Spiderman villain fights with a big wheel.

Who is Big Wheel?

200

Spreadsheet software created by Microsoft that helps organize and turn data into useful tables, charts, and graphs.

What is Microsoft Excel?

200

Authentication that requires two or more evidences of authentication, usually of different types.

What is Multifactor Authentication?

200

A form of encryption that uses only one key to encrypt and decrypt a file. This is a less secure form of encryption.

What is Symmetric Encryption?

200

The buying and selling of products or services electronically, typically through the internet.

What is Ecommerce?

200

This Batman villain fights using ketchup and mustard guns and often makes puns about various food toppings.

Who is Condiment King?

300

Attempting to secretively discover private information about a person, company, or other entity.

What is Snooping?

300

A type of authentication that requires the user to provide something that they know, such as a password or PIN.

What is Type 1 Authentication?

300

A form of encryption in which both parties involved have a public key and a private key. By using complex mathematical formulas, the computer generates the keys in a way that any file encrypted with the public key can only be decrypted by the private key.

What is Asymmetric Encryption?

300

Directions for disposing computer devices and destroying data when it's no longer needed or when a storage device needs to be replaced.

What is Data Destruction Policy?

300

This Green Lantern Corps member is a living planet.

Who is Mogo?

400

The use of deception to gain personal and/or private information for unlawful purposes.

What is Social Engineering?

400

A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face, or voice.

What is Type 3 Authentication?

400

An attempt to connect to a server by capturing and resending authentication information.

What is a Replay Attack?

400

A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two strategies of this.

What is Data Redundancy?

400

This superhero is capable of eating any matter, as can all members of his alien race.

Who is Matter-eater Lad?
500

An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.

What is Denial of Service?

500

The ability to ensure that someone can't deny that they performed a certain act.

What is Non-repudiation?

500

Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.

What is a Browser Attack?

500

The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.

What is Business Continuity?

500

This detective possesses no powers at all. His only distinguishing feature is that he has no face.

Who is The Question?

M
e
n
u