Environmental security
Cybersecurity
Political security
Economic security
Miscellaneous
100

The two actors interact in environmental security.

Environment

Human

100

The three pillars every cybersecurity specialist should know.

Confidentiality

Integrity

Availability

100

The phenomenon of transmitting false or incomplete information.

Misinformation

100

The popular method of authentication that organizations use to make username and password mechanisms more robust.

Second Factor Authentication

100

A popular retail store that was attacked through its HVAC vendor.

Target

200

The type of contamination that can affect our ability to concentrate.

Air pollution

200

A common social engineering attack that involves the impersonation of a trusted party.

Phishing

200

A notorious federal employee that flew from Hawaii to Hong Kong and then to Russia.

Edward Snowden

200

The mechanism that organizations use to minimize the risk of new employees.

Screening

200

The type of malware we are defending against when we cover our webcams.

Spyware

300

The reason why the ancient greeks relied on imports.

The Soil

300

The type of malware that hides inside a file.

Trojan Horse

300

The country that was affected by Stuxnet.

Iran

300

The mechanism to access the risk on an organization.

Risk assessment

300

Popular security control that filters the port traffic of a device.

Firewall

400
The resource that many experts consider as the next commodity humanity will fight upon.

Water

400

The northern European country that held the entire general elections using electronic voting.

Estonia

400

The northern European country that held the entire general elections using electronic voting.

Estonia

400

The three types of security controls in any organization.

Operational

Managerial

Technical

400

A notorious hacker that sought refugee in the Ecuadorean embassy in London.

Julian Assange

500

The scale used to measure earthquakes

Richter scale

500

The pillar of security that is mainly affected during a DDoS attack.

Availability

500

The security mechanism that Edward Snowden relied on to share state secrets.

Encryption

500

The type of attack hackers use to kidnap data from organizations.

Ransomware

500

Offical regulation that protects data and privacy in Europe.

General Data Protection Regulation (GDPR)