This “most wanted hacker” of the 1990s was famous for breaking into corporate networks and social engineering his way into systems.
Who is Kevin Mitnick?
This command-line tool checks whether a host is reachable — and shares its name with a sonar sound.
The “brain” of your computer.
What is the CPU?
The process of turning plaintext into ciphertext.
What is encryption?
The CIA triad stands for these three core principles.
What are Confidentiality, Integrity, and Availability?
In this type of cyber attack, a hacker impersonates a company executive or vendor via email to trick employees into sending money or sensitive information.
What is Business Email Compromise (BEC)?
This exploit abuses a program by feeding it data larger than it can handle, potentially allowing attackers to hijack memory and execute arbitrary code.
What is a buffer overflow?
This spooky tech can mimic human decision-making and learning.
What is artificial intelligence?
This type of cryptography uses both a public and private key.
What is asymmetric encryption?
This healthcare regulation protects patient information in the U.S.
What is HIPAA?
This 2017 ransomware attack spread worldwide, encrypting files on infected computers and demanding Bitcoin payments to release them.
What is WannaCry?
This type of attack injects malicious code into a website’s input fields, tricking the browser into executing unintended commands.
What is Cross-Site Scripting (XSS)?
A network of compromised devices, where each infected computer is called a “zombie,” can be controlled to launch a coordinated DDoS attack.
What are botnets?
HTTPS uses this encryption protocol to secure websites.
What is TLS (Transport Layer Security)?
This security approach assumes no user or device should ever be trusted by default.
What is Zero Trust?
One of the first email-borne viruses to spread rapidly, it infected Microsoft Word documents and caused office chaos in 1999.
What is the Melissa virus?
This type of automation script on Linux can schedule tasks to run at specific times, often for maintenance or attacks.
What is a cron job?
These futuristic computers use qubits instead of bits, allowing them to exist in multiple states simultaneously and solve certain problems much faster than classical computers.
What is a quantum computer?
In cryptography, this chilling phenomenon describes how a tiny change in the input causes a massive change in the output.
What is the Avalanche Effect?
This European Union regulation gives individuals unprecedented control over their personal data and requires organizations to report breaches within 72 hours.
What is the General Data Protection Regulation (GDPR)?
This anonymous collective, often wearing Guy Fawkes masks, is known for high-profile cyberattacks and hacktivism campaigns targeting governments and corporations.
Who is Anonymous?
This file in Linux stores user account information, including hashed passwords, and is a common target for attackers.
What is /etc/shadow?
This monster supercomputer was first installed in 1976, the same year the cult classic horror film Carrie was released, making it a terrifying year for both technology and Halloween fans.
What is the Cray-1?
The “RSA” algorithm is named after these three inventors.
Who are Rivest, Shamir, and Adleman?
These five continuous functions make up the core of the NIST Cybersecurity Framework and guide organizations in managing cybersecurity risk.
What are Identify, Protect, Detect, Respond, and Recover?