Attack!!!
Being Social
Are You Vulnerable?
Are you a tool?
Going Mobile
100

A harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes 

What is Polymorphic malware?
100

The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information

What is Spear Phishing?
100

Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations

What is a buffer overflow?
100

Software products and services combine security information management and security event management. They provide real-time analysis of security alerts generated by applications and network hardware.

What is SIEM (Security Information and Event Management)?
100

A short-range wireless connectivity standard (Ecma-340, ISO/IEC 18092) that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.

What is NFC (Near Field Communication)?
200

A computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.

What is a Keylogger?
200

Searching through trash or garbage looking for useful information that may help an individual get access to a particular network

What is Dumpster Diving?
200

An attack that is yet unknown to the software maker or to antivirus vendors.

What is Zero Day Attack
200

A computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.

What is NAC ( Network Access Control)?
200

Used to remove restrictions imposed by the manufacturer or operator, e.g. to allow the installation of unauthorized software.

What is Jailbreaking?
300

A piece of software that allows a remote "operator" to control a system as if he has physical access to that system. 

Remote Access Trojan
300
What is Vishing?
300

A simple denial of service condition that happens when the resources required to execute an action are entirely expended, preventing that action from occurring

What is resource exhaustion?
300

A list of permissions attached to an object that specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.

What is Access Control List?
300

A model where employees choose from a limited selection of approved, corporate-liable devices with the pre-configured security and control that IT needs to protect company data.

What is CYOD(Choose Your Own Device)?
400

A set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects

What is a Logic Bomb?
400

The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.

What is Pharming?
400

It describes a set of situations that can occur in data centers that result in poor hardware resource utilization, poor system and software level security, and wasted energy.

What is System Sprawl?
400

A protection feature built into many firewalls that allow the administrator to tweak the tolerance for unanswered login attacks. It tracks network traffic to identify scenarios that will overwhelm our network through conditions such as SYN, ping, port floods, etc.

What is a Flood Guard?
400

A type of security software used by an IT department to monitor, manage and secure employees' mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.

What is Mobile Device Management?
500

A computer virus that contains a variety of mechanisms specifically coded to make its detection and decryption very difficult

What is an Armored virus?
500

A security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit

What is a Watering Hole attack?
500

A failure in a program to release discarded memory, causing impaired performance or failure

What is a memory leak?
500

A physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.

What is a HSM(Hardware Security Module)?
500

A term used mostly on the Internet, similar to "upload" and "download", but in reference to the process of transferring data between two local devices, in particular between a computer and a mobile device such as a mobile phone, smartphone, PDA, tablet, portable media player or e-reader

What is Sideloading?
M
e
n
u