Cybersecurity
Threat Analysis
Cyber Attacks
Splunk
Money Heist
100

This is a virus made by a Filipino Computer Science student which was sent via email in 2000 with an attachment of vbs.

What is I love you virus?

100

This refers to the weakness of the system.

What is vulnerability?

100

This attack is made through SQL code where text inputs are inserted as valid SQL commands.

What is SQL Injection?

100

It is an example of SIEM which we will utilized in our class.

What is Splunk?

100

This is the country where transfer originated.

What is Bangladesh?

200

This separates an ethical hacking from an actual hacking.

What is consent?

200

This is the formula for risk.

What is Probability X Impact?

200

This is the meaning of XSS.

What is cross-site scripting?

200

This is the meaning of SIEM.

What is Security Information and Events Management.

200

This is the holiday in the Philippines which fell on a Monday that was taken advantage of the attacker to delay the response to anomalous transfers.

What is Chinese New Year?

300

This is refers to digital aspect of Information Security.

What is cybersecurity?

300

This is one example of external sources of threat data.

What is OSINT, commercial threat feeds or government reports?

300

This involves stopping a verified resources to access a system or website by sending overflowing access requests.

What is Denial of Service or DOS?

300

These are knowledge objects that represent searchable key-value pairs in event data.

What are fields?

300

This is the year that the money heist happened.

What is year 2016?
400

This is the meaning of shortened term malware.

What is malicious software.

400

These are two examples of internal sources for threat intelligence.

What are network logs/SIEM, incident reports and phishing simulation reports?

400

This is the meaning of VAPT.

What is Vulnerability Assessment and Penetration Testing?

400

This is the keyword for the voucher we used to take the course for free.

What is VTFoundation?

400

This is the branch of RCBC where the transfer happened.

What is Jupiter branch?

500

This is the meaning of CIA in Information Security.

What is Confidentiality, Integrity and Accessibility?
500

These are the four types of risk treatment.

What are risk avoidance, mitigation, transference and acceptance?

500

This attack is a type of eavesdropping attack where an attacker intercepts and relays communications between two parties, pretending to be one of them.

What is Man-In-the-Middle attack?

500

There are two examples of default selected fields.

What are host, source, or sourcetype?

500

This is the total amount in dollars that was successfully transferred to the Philippines.

What is 81M?

M
e
n
u