Cloud Security & Architecture
Mobile & IoT Security
Cryptography & Digital Certificates
Threat Intelligence & Attribution
Business Continuity & Disaster Recovery
100

This cloud service model provides computing infrastructure like servers and storage, often abbreviated as three letters ending in "aaS"

What is IaaS (Infrastructure as a Service)

100

This mobile security practice involves remotely erasing data from a lost or stolen device—like a digital self-destruct button

What is remote wipe

100

This cryptographic method uses the same key for both encryption and decryption—like having one key that locks and unlocks the same door

What is symmetric encryption

100

This type of intelligence provides technical details about specific threats, including indicators of compromise and attack techniques

What is tactical threat intelligence

100

This metric measures the maximum acceptable length of time that a business process can be down after a failure occurs

What is RTO (Recovery Time Objective)

200

This security architecture approach assumes that threats exist both inside and outside the network, so it verifies everything before granting access

What is Zero Trust

200

This approach allows employees to use personal devices for work while maintaining security controls—it's a balancing act between convenience and security

What is MDM (Mobile Device Management)

200

This cryptographic hash function produces a 256-bit hash value and is commonly used in blockchain technology and digital signatures

What is SHA-256

200

These identifiers help security teams recognize when they're seeing the same threat actor or campaign across different incidents

What are IOCs (Indicators of Compromise)

200

This backup strategy follows the 3-2-1 rule: keep this many copies of important data, on this many different media types, with this many stored offsite

What is 3-2-1 backup (3 copies, 2 different media, 1 offsite)

300

This cloud deployment model combines public and private clouds, allowing data and applications to be shared between them

What is hybrid cloud

300

These everyday connected devices, from smart TVs to refrigerators, often lack proper security and create new attack vectors in homes and offices

What are IoT devices (Internet of Things)

300

This infrastructure manages digital certificates and public-private key pairs for secure communications—it's like a digital ID card system

What is PKI (Public Key Infrastructure)



300

This framework by MITRE describes adversary tactics and techniques based on real-world observations of cyberattacks

What is ATT&CK (or MITRE ATT&CK)

300

This type of site provides a basic facility with power and network connectivity but requires you to bring your own equipment and data

What is a cold site

400

This process involves moving applications and data from on-premises infrastructure to cloud services—like moving to a new house

What is cloud migration

400

This mobile app security testing technique involves examining the app's code and behavior without actually running it—like reading a recipe instead of cooking

What is static analysis

400

This attack against cryptographic systems tries all possible keys until finding the correct one—it's like trying every key on a keychain

What is a brute force attack

400

This process involves analyzing threat intelligence to determine which threat actors might be behind a cyberattack—like detective work

What is attribution

400

This exercise tests an organization's incident response and recovery procedures by simulating a real disaster scenario

What is a tabletop exercise (or disaster recovery drill)

500

This shared responsibility model in cloud computing means both the cloud provider and customer have security obligations—it takes two to tango

What is the shared responsibility model


500

This type of mobile malware spreads through app stores and can steal personal information or display unwanted advertisements

What is mobile malware (or malicious apps)

500

This process ensures that a digital certificate has not been revoked and is still valid—like checking if a driver's license is still good

What is certificate validation (or certificate revocation checking)

500

This type of threat intelligence focuses on understanding the motivations and capabilities of threat actors—it's about knowing your enemy

What is strategic threat intelligence

500

This agreement between a service provider and customer defines the expected level of service availability and performance

What is an SLA (Service Level Agreement)