This is a virus made by a Filipino Computer Science student which was sent via email in 2000 with an attachment of vbs.
What is I love you virus?
This refers to the weakness of the system.
What is vulnerability?
This attack is made through SQL code where text inputs are inserted as valid SQL commands.
What is SQL Injection?
It is an example of SIEM which we will utilized in our class.
What is Splunk?
This is the country where transfer originated.
What is Bangladesh?
This separates an ethical hacking from an actual hacking.
What is consent?
This is the formula for risk.
What is Probability X Impact?
This is the meaning of XSS.
What is cross-site scripting?
This is the meaning of SIEM.
What is Security Information and Events Management.
This is the holiday in the Philippines which fell on a Monday that was taken advantage of the attacker to delay the response to anomalous transfers.
What is Chinese New Year?
This is refers to digital aspect of Information Security.
What is cybersecurity?
This is one example of external sources of threat data.
What is OSINT, commercial threat feeds or government reports?
This involves stopping a verified resources to access a system or website by sending overflowing access requests.
What is Denial of Service or DOS?
These are knowledge objects that represent searchable key-value pairs in event data.
What are fields?
This is the year that the money heist happened.
This is the meaning of shortened term malware.
What is malicious software.
These are two examples of internal sources for threat intelligence.
What are network logs/SIEM, incident reports and phishing simulation reports?
This is the meaning of VAPT.
What is Vulnerability Assessment and Penetration Testing?
This is the keyword for the voucher we used to take the course for free.
What is VTFoundation?
This is the branch of RCBC where the transfer happened.
What is Jupiter branch?
This is the meaning of CIA in Information Security.
These are the four types of risk treatment.
What are risk avoidance, mitigation, transference and acceptance?
This attack is a type of eavesdropping attack where an attacker intercepts and relays communications between two parties, pretending to be one of them.
What is Man-In-the-Middle attack?
There are two examples of default selected fields.
What are host, source, or sourcetype?
This is the total amount in dollars that was successfully transferred to the Philippines.
What is 81M?