Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to private computer systems
What is malware
This mythical beings defy death by sucking the blood of humans
What are vampires
This is another term for Asymmetric Cryptography
Public-Key Cryptography
Superstition says bad luck is imminent if you cross paths with this color cat
What is black
Tricks users in to giving sensitive information
What is social engineering
A computer program containing malicious segment that attaches itself to an application program or other executable component
What is a virus
This is considered the birthplace of Halloween
What is Ireland
Stream Ciphers are commonly used for
What is videos or streams
The word witch comes from the Old English word wicce, meaning
What is wise woman
Users are not able to access or utilize a system
What is Denial-of-service (DoS) attack
Malicious software collecting information about users without their knowledge/consent
What is spyware
Michael Meyers mask was actually this actor's mask from Star Trek
Who is William Shatner
Cryptography or Encryption falls under what part of the CIA triad?
What is Confidentiality
This monster was created as a science experiment
What is Frankenstein
Brute Force Attack
Malicious software that initially presents itself as legitimate program or file
What is a Trojan
This famous magician died on Halloween night in 1926
Who is Harry Houdini
This subatomic particle is used in quantum cryptography
What is a photon
This was the first wrapped penny candy in America
What is the tootsie roll
Used to crack common word passwords
What is Dictionary Attack
The famous worm was suspected for damaging Iran's nuclear power plant
What is Stuxnet
What do you get if you divide the circumference of a pumpkin by it's diameter?
What is pumpkin (pie sign)
Of stream and block ciphers, which one is symmetric?
What is both
According to tradition, if a person wears his or her clothes inside out and then walks backwards on Halloween, he or she will see a what at midnight
What is a witch
Exploited vulnerability that was present since the release of a product
What is Zero Day Attack