The process of turning data points into useful information.
What is Data Analytics?
The process of keeping track of user activity while attached to a system.
What is Accounting?
The process of encoding or translating data into another form so that only the intended recipient can decrypt and read the data.
What is Data Encryption?
Software that helps protect against malicious software infections.
What is Anti-Malware Software?
This Spiderman villain fights with a big wheel.
Who is Big Wheel?
Spreadsheet software created by Microsoft that helps organize and turn data into useful tables, charts, and graphs.
What is Microsoft Excel?
Authentication that requires two or more evidences of authentication, usually of different types.
What is Multifactor Authentication?
A form of encryption that uses only one key to encrypt and decrypt a file. This is a less secure form of encryption.
What is Symmetric Encryption?
The buying and selling of products or services electronically, typically through the internet.
What is Ecommerce?
This Batman villain fights using ketchup and mustard guns and often makes puns about various food toppings.
Who is Condiment King?
Attempting to secretively discover private information about a person, company, or other entity.
What is Snooping?
A type of authentication that requires the user to provide something that they know, such as a password or PIN.
What is Type 1 Authentication?
A form of encryption in which both parties involved have a public key and a private key. By using complex mathematical formulas, the computer generates the keys in a way that any file encrypted with the public key can only be decrypted by the private key.
What is Asymmetric Encryption?
Directions for disposing computer devices and destroying data when it's no longer needed or when a storage device needs to be replaced.
What is Data Destruction Policy?
This Green Lantern Corps member is a living planet.
Who is Mogo?
The use of deception to gain personal and/or private information for unlawful purposes.
What is Social Engineering?
A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face, or voice.
What is Type 3 Authentication?
An attempt to connect to a server by capturing and resending authentication information.
What is a Replay Attack?
A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two strategies of this.
What is Data Redundancy?
This superhero is capable of eating any matter, as can all members of his alien race.
An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
What is Denial of Service?
The ability to ensure that someone can't deny that they performed a certain act.
What is Non-repudiation?
Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.
What is a Browser Attack?
The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
What is Business Continuity?
This detective possesses no powers at all. His only distinguishing feature is that he has no face.
Who is The Question?