Once was the most wanted cyber criminal in the world.
Who is Kevin Mitnick?
This is a bad password because then a hacker can get in easier to more things.
What is using personal and common passwords?
Malware to block access to a computer system until a certain amount of money is paid.
What is ransomware?
The original text before encryption.
What is Plaintext?
Common security measures involving a username and a password.
What is authentication?
Used a worm to target Iranian nuclear facilities.
What did stuxnet do?
This is the minimum recommended length for a strong password.
What is 12 characters?
Type of malware designed to replicate itself and spread to other computers.
What is a Worm?
Secures communication over the internet.
What is SSL/TLS
Device that lets in and out going network traffic based on the security.
What is a Fire wall?
Suffered a massive data breach in 2013 and it compromised over a billion users.
What happened to Yahoo?
This is like a one time password commonly in two step verification.
What is TOTP
Malware that is designed to record the keystrokes on a users computer.
What is keylogger?
This is the process of converting plaintext into a intelligible text
What is encryption?
Software and hardware that monitors and records upcoming and outgoing network traffic based on security.
What is NIDS?
Who is Anonymous?
Its the term for it using every combination thats possible.
What is a Brute force attack?
Often is confused with a legit website and it gains access to a computer while its hidden from the user.
What is Trojan Horse?
This is the process of converting plaintext into a unintelligible text
What is decryption?
A private network to use public network.
What is a VPN?
event in 2014 that leaked personal photos from several high profile celebrities due to apple's icloud service.
What is the Fapp?
System that uses two different keys, one public, and one private.
What is public-key?
Malware that was discovered in 2010 and is believed to be in IranĀ“s Nuclear program.
What is Stuxnet?
a digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.
What is Cryptocurrency?
any activity designed to protect the usability and integrity of your network and data.
What is Network Security?