Laws and Regulations
Pop Culture
Threat Actors and Attack Types
Back to the Basics
Cyber Potpourri
100

This act, enacted in 1996, aims to protect the privacy of individuals' medical records.

What is HIPAA (Health Insurance Portability and Accountability Act)?

100

This 1999 movie features a hacker discovering the reality of a simulated world.

What is the Matrix? 

100

 This term refers to someone who uses their technical skills for malicious purposes.

What is a hacker?

100

This common security measure requires users to enter a code sent to their mobile device in addition to their password.

What is two-factor authentication (2FA)?

100

This technology involves using biological characteristics for authentication.

What is biometric security?

200

This regulation, effective in 2018, enhances data protection and privacy for individuals within the European Union.

What is GDPR (General Data Protection Regulation)?

200

This 2016 movie is about a cyber warfare expert helping a CIA agent.

What is Snowden?

200

This type of attack tricks users into giving up sensitive information by pretending to be a trustworthy entity.

What is phishing?

200

This practice involves regularly updating software to fix security vulnerabilities.

What is patch management?

200

This technology uses patterns and algorithms to detect and respond to cyber threats.

 What is artificial intelligence (AI)?

300

This U.S. law requires publicly traded companies to disclose any material data breaches to the SEC.

What is the Sarbanes-Oxley Act (SOX)?

300

This TV show centers around a hacker group known as fsociety.

What is Mr. Robot? 

300

This type of malware locks a user's data and demands payment for its release.

What is ransomware?

300

 This is the term for a weakness in a system that can be exploited by a threat actor.

What is a vulnerability?

300

This certification, offered by CompTIA, covers foundational security knowledge and skills

What is CompTIA Security+?

400

This act criminalizes unauthorized access to computer systems and networks.

What is the Computer Fraud and Abuse Act (CFAA)?

400

This 1995 movie stars Angelina Jolie as a high school hacker.

What is Hackers?

400

This type of hacker has permission to test and secure systems.

What is a white hat hacker?

400

This model provides a systematic approach to managing and protecting an organization's sensitive data.

 What is the CIA Triad (Confidentiality, Integrity, Availability)?

400

This act, passed in 2002, aims to protect U.S. government computer systems from cyber threats.

What is the Federal Information Security Management Act (FISMA)?

500

This framework provides a policy, guidelines, and practices for federal agencies to manage and reduce cybersecurity risk.

What is the NIST framework?

500

This video game series features a hacker protagonist named Aiden Pearce.

What is Watch Dogs?

500

This is the term for a government-sponsored hacker.

What is a state-sponsored actor?

500

This is a security protocol for establishing a secure connection over a computer network.

What is SSL/TLS (Secure Sockets Layer/Transport Layer Security)?

500

This cybersecurity technique involves creating deceptive resources to attract and detect attackers.

What is a honeypot?

M
e
n
u