The Essential Eight & ISM
Network(ing together!)
Cyber Threats and those who fight them
Law & Legalese
Innovation & Creation
100

This 4 letter acronym is used as a shorthand for our very own cyber security team in Australia

What is the ASCS (Australian Cyber Security Centre)?

100

This network type connects computers and other devices in a small geographical area, such as a home or school

What is a LAN?

100

This type of threat is made from The Bad Guys(tm).

What is a Deliberate threat?

100

This Victorian law caters specifically for Victorian government agencies and contains 10 Information Privacy Principles (IPPs)

What is the Privacy and Data Protection Act 2014 (Vic)?

100

I want to show how my code works, but so a non-nerd can (almost) understand it. This type of code is perfect for that.

What is pseudocode?

200

This core strategy from the Essential Eight involves applying updates to software to fix known vulnerabilities

Patch Applications

200

The network hardware that connects wired devices to each other on a single LAN.

What is a Switch?

200

This component of the CIA triad refers to ensuring that only authorised individuals can access data

What is Confidentiality?

200

Failing to comply with privacy legislation and guidelines can lead to fines, lawsuits, and this type of widespread public consequence.
(Please don't leave any bad google reviews...)

What is Reputational Damage.

200

This digital system feature refers to the specific benefit the system delivers, such as providing a quick, easy, and secure item checkout.
(If it doesn't help someone; why make it?)

What is a Capabality?

300

This is the Essential Eight strategy related to copying and securely storing data to guard against possible data loss

What are Regular Backups?

300

This small, private network connects personal devices like wearables and smartphones in a very small geographical area using technologies like Wi-Fi and Bluetooth.

What is a WPAN?

300

This type of attack is used to flood a network from either a single device or a whole network of them, shutting down the service, giving by a 3 (or 4) letter acroym.

What is a DoS (or DDoS) attack?

[Distributed Denial of Service] 

300

This specific APP (number!) dictates that collected information should only be used and disclosed for the purpose stated when it was originally gathered.
(I wont share your survey data with ad makers, I promise...)

What is APP6

300

This functional design tool identifies the data to be used including variable name, type, scope and description.

Nope, not a thesaurus! 

What is a Data Dictionary

400

The ISM networking guidelines recommend limiting this physical characteristic of wireless signals to reduce network exposure

What is a Wireless Footprint?

400

The technology that allows off-site personnel to access a remote network securely by creating a private tunnel using strong encryption keys
(This question is sponsored by....)

What is a VPN?

400

This type of encryption uses the same key for both encrypting the plain-text and decrypting the cipher-text

What is Symmetric encryption?

400

This is automatically owned by the person who created it under the Copyright Act 1968 (Cth), covering literary, dramatic, musical, and artistic works.
(Yes, even your own solutions you just developed!)

What is Intellectual Property (IP)?

400

This ideation tool is used to understand a users perspective and how they feel.
No, you don't need to be an empath to use it!

What is empathy mapping?

500

This ISM strategy ensures that networks are divided into smaller sections to limit access and contain the effects of a breach.
(Please quarantine the infected away from my network!)

What is Segmentation & Segregation?

500

This piece of network hardware acts as a translator, converting data signals into light impulses, analogue sound waves, or radio waves depending on the connection type.

What is a Modem?

500

This three letter acronym is a type of system that monitors all network traffic to detect intrusions and then alerts relevant parties, but does not actively stop the threat.


What is an IDS (Intrusion Detection System)

500

This core principle is covered in:
- The Privacy Act (1988) - APP11
- The Health Records Act (2001) - IPP4
- The Privacy & Data Protection Act (2014) - HPP4 

Can the data be breached in any way?

What is Data Security?
(Or any synonym relating to securing data from breach, loss, damage and/or access)

500

Within a Gantt chart order is important;

This term is used to describe the relationships the arrows given between tasks.

What is a dependency?