This is a form of social engineering that involves sending a large amount of victims emails falsely claiming to be from a reputable source
What is Phishing?
What is Net Cat?
This simple cypher involves replacing each letter of the plain text with the letter in the alphabet a certain number of characters away from the original letter
What is a Ceasar cypher?
IoT
What is the Internet of Things?
This is the number of children that Dr. Preston has
How many is Two?
This is a cyber attack that usually involves multiple computers requesting information from a single server with the aim of slowing down or disabling its ability to respond
What is a Denial of Service attack?
This tool captures and displays packets from a network connection
What is Wireshark?
This is a fixed length output from an irreversible cryptographic function
What is a Hash
AV
What is Anti-Virus?
This AU Professor is known for using strange phrases such as "Wide latitude of response"
Who is Dr. Sutton?
This cyber attack involves inputting unexpected information into a user field with the aim of executing malicious code on the server that receives the data
What is SQL injection?
This tool is used for scanning IP addresses and ports on a network and determining installed applications
What is NMAP?
In Public Key Infrastructure these two types of keys are used to encrypt and decrypt information
What are Public and Private Keys?
NIST
What is the National Institute for Standards and Technology
This AU Professor used to work as a board game designer
Who is Professor Burch?
What is Buffer Overflow?
This tool is used to create fake WiFi networks and intercepting the traffic that goes through them
What is a Pineapple/Rouge Access Point?
This is the random string of data used to modify a password hash
What is a Salt?
CISA
What is Cybersecurity and Infrastructure Security Agency?
This AU Professor designs Lego sets in their spare time
Who is Dr. Craton?
This is a kind of attack that injects client-side scripts into web pages viewed by other users
What is Cross Site Scripting?
This tool automates many parts of the penetration testing process including access, persistence, evasion and post-exploitation processes
What is Metasploit?
This person developed PGP (Pretty Good Privacy) encryption in 1991
Who is Phil Zimmerman
OSI model
What is the Open Systems Interconnection model?
This AU Professor collects Pez dispensers
Who is Dr. Frank?