Rogue Reinforcement
Digital Doppelgängers
Cyber-Physical Attacks
Bits and Bolts
Zero-day Attacks
100

A security practice that helps protect against phishing attacks by ensuring that users don’t reuse the same password across multiple accounts.

What is using unique, strong passwords and enabling multi-factor authentication (MFA)?

100

This technology uses artificial intelligence to create convincing fake videos or audio recordings of individuals.

What is deepfake technology?

100

A security breach that impacts operations, damages physical property or environment.

What is a cyber physical attack?

100

A branch of computer science that aims to create machines capable of mimicking human intelligence.

What is AI?

100

This term refers to a vulnerability in software that is unknown to those who should be interested in its mitigation.

What is a zero-day vulnerability?

200

A term describes a piece of self-replicating malware that travels through a network without the need for human interaction.

What is a worm?

200

Deepfake technology can be used for these two malicious purposes, including impersonation and spreading this.

What are impersonation and disinformation?

200

Attackers breach secure military facilities, install malware, or steal sensitive equipment.

How can a physical cyber attack affect a military entity?

200

The network of physical devices, vehicles, appliances, and other items embedded with sensors, software, and other technologies that can connect and exchange data with other devices and systems over the internet.

What is IoT?

200

This attack in 2014 targeted a major entertainment company, resulting in the shutdown of its network and the leak of unreleased movies and confidential data.

What is the Sony Pictures attack?

300

Situation that involves creating a fabricated scenario to manipulate someone into divulging information.

What is pretexting?

300

To combat deepfake threats, one countermeasure involves the development of these tools that analyze media content for inconsistencies.

What are deepfake detection tools?

300

A common attack against a country during a presidential election.

What is Voting machine systems and Databases?

300

What is reshaping industries, from healthcare to transportation to finance, by offering more innovative solutions, predictive capabilities, and enhanced user experiences?

What is AIoT?

300

This AI-powered attack tool, created by IBM researchers, hides its malicious intent until it infects a specific target, using indicators like facial recognition and geolocation.

What is DeepLocker?

400

What do we call a network of compromised devices controlled by a central command (often using AI algorithms)?

What is a “botnet”?

400

Educating users about the existence of deepfakes and the importance of this practice is a crucial countermeasure.

What is verifying sources?

400

A way AI be used to gain access to voter fund raising.

What is AI created voices?

400

IoT devices often have constrained computational resources due to their specific functions. This limitation leaves little room for robust _______ mechanisms.

What is security?

400

This institute, created by the Biden-Harris Administration in 2023, will focus on AI safety and trust, especially for advanced AI models like generative AI.

What is the U.S. Artificial Intelligence Safety Institute (USAISI)?

500

What term describes an AI system that intentionally misleads or manipulates its output to deceive humans or other AIs?

What is “adversarial AI”?

500

Policies to regulate the creation and dissemination of this type of media are a key countermeasure against deepfake threats.

What is synthetic media?

500

The most common liability that can cause a company to be sued.

What is Legal and Regulatory Compliance?

500

Implementing robust IoT security protocols, including encryption, authentication mechanisms, and continuous monitoring to detect and mitigate vulnerabilities before they are exploited.

What is a countermeasure for IoT?

500

In 2017, a massive zero-day vulnerability in this Windows protocol led to the WannaCry ransomware attack.

What is the Server Message Block (SMB) protocol?