Attack!!!
Being Social
Are You Vulnerable?
Are you a tool?
Acronyms
100

A harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes 

What is Polymorphic malware?
100

The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information

What is Spear Phishing?
100

Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations

What is a buffer overflow?

100

a type of networking device that provides secure creation of VPN connections and delivery of messages between VPN nodes. It is a type of router device, built specifically for creating and managing VPN communication infrastructures.

What is a VPN Concentrator?

100

CSRF or XSRF

What is Cross Site Request Forgery?

200

A computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.

What is a Keylogger?
200

Searching through trash or garbage looking for useful information that may help an individual get access to a particular network

What is Dumpster Diving?
200

An attack that is yet unknown to the software maker or to antivirus vendors.

What is Zero Day Attack

200

A computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.

What is NAC ( Network Access Control)?

200

XSS

What is Cross Site Scripting?

300

A piece of software that allows a remote "operator" to control a system as if he has physical access to that system. 

Remote Access Trojan
300
What is Vishing?
300

Rainbow tables automate the cracking the ___________ process

What is a hash?

300

A list of permissions attached to an object that specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.

What is Access Control List?

300

RAT

What is Remote Access Trojan?

400

A set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects

What is a Logic Bomb?
400

The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.

What is Pharming?
400

Session hijacking uses ______________ to exploit a valid computer session


DAILY TRIPLE!!!!

What is Cookies?

400

A protection feature built into many firewalls that allow the administrator to tweak the tolerance for unanswered login attacks. It tracks network traffic to identify scenarios that will overwhelm our network through conditions such as SYN, ping, port floods, etc.


DAILY TRIPLE!!!

What is a Flood Guard?

400

DEP


DAILY TRIPLE!!!!!!!!!!

What is Data Execution Prevention?

500

A computer virus that contains a variety of mechanisms specifically coded to make its detection and decryption very difficult

What is an Armored virus?
500

A security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit

What is a Watering Hole attack?
500

A failure in a program to release discarded memory, causing impaired performance or failure

What is a memory leak?

500

is usually an internal-facing proxy used as a front-end to control and protect access to a server on a private network.


DAILY DOUBLE!!!!!!!


What is a Reverse Proxy?

500

ESP


DAILY TRIPLE!!!!!!!!!!

What is Encapsulation Security Payload?

M
e
n
u