Types of Attacks
Tools
Cryptography
Acronyms
AU Professors
100

This is a form of social engineering that involves sending a large amount of victims emails falsely claiming to be from a reputable source

What is Phishing?

100
This tool reads and writes data over network connections when provided with a web address or IP address

What is Net Cat?

100

This simple cypher involves replacing each letter of the plain text with the letter in the alphabet a certain number of characters away from the original letter

What is a Ceasar cypher?

100

IoT

What is the Internet of Things?

100

This is the number of children that Dr. Preston has

How many is Two?

200

This is a cyber attack that usually involves multiple computers requesting information from a single server with the aim of slowing down or disabling its ability to respond

What is a Denial of Service attack?

200

This tool captures and displays packets from a network connection

What is Wireshark?

200

This is a fixed length output from an irreversible cryptographic function

What is a Hash

200

AV

What is Anti-Virus?

200

This AU Professor is known for using strange phrases such as "Wide latitude of response"

Who is Dr. Sutton?

300

This cyber attack involves inputting unexpected information into a user field with the aim of executing malicious code on the server that receives the data

What is SQL injection?

300

This tool is used for scanning IP addresses and ports on a network and determining installed applications

What is NMAP?

300

In Public Key Infrastructure these two types of keys are used to encrypt and decrypt information

What are Public and Private Keys?

300

NIST

What is the National Institute for Standards and Technology

300

This AU Professor used to work as a board game designer

Who is Professor Burch?

400
This attack takes advantage of a vulnerability where data exceeds the limit of its storage location and corrupts adjacent memory locations

What is Buffer Overflow?

400

This tool is used to create fake WiFi networks and intercepting the traffic that goes through them

What is a Pineapple/Rouge Access Point?

400

This is the random string of data used to modify a password hash

What is a Salt?

400

CISA

What is Cybersecurity and Infrastructure Security Agency?

400

This AU Professor designs Lego sets in their spare time

Who is Dr. Craton?

500

This is a kind of attack that injects client-side scripts into web pages viewed by other users

What is Cross Site Scripting?

500

This tool automates many parts of the penetration testing process including access, persistence, evasion and post-exploitation processes

What is Metasploit?

500

This person developed PGP (Pretty Good Privacy) encryption in 1991

Who is Phil Zimmerman

500

OSI model

What is the Open Systems Interconnection model?

500

This AU Professor collects Pez dispensers

Who is Dr. Frank?