What color is my hat?
ATTACK!
Other Stuff..
Misc
Smooth Criminals..
100
After hacking into ATM machines remotely, he worked with ATM manufacturers to resolve the found security vulnerabilities.
What is Gray Hat
100
A weakness that makes a target susceptible to an attack
What is a vulnerability
100
This type of threat originates from within an organization.
What is an internal threat
100
This is what the acronym IoE represents
What is Internet of Everything
100
Have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
What is script kiddies
200
I used malware to compromise several corporate systems to steal credit card information and sold that information to the highest bidder.
What is Black Hat.
200
Criminals use this type of tool to capture data streams over a network.
What is a packet sniffer
200
This NIST/NICE Cybersecurity specialty area reviews and evaluates incoming cybersecurity information.
What is analyze
200
What does the term BYOD represent?
What is bring your own device.
200
Gather intelligence or commit sabotage on behalf of their government.
What is a state-sponsored attacker
300
My job is to identify weaknesses in the computer system in my company
What is white hat.
300
This type of cyber attack causes DNS servers to redirect traffic for a specific domain to the criminal's computer.
What is DNS spoofing. (or DNS cache poisoning)
300
This industry certification was mentioned in the chapter!
What is CompTIA Security+, EC-Council Certified Ethical Hacker (CEH), (ISC)^2 Certified Information Systems Security Professional (CISSP), ISACA Certified Information Security Manager (CISM), Cisco Certified Network Associate Security (CCNA Security),
300
Name one example of a data domain?
What is Google, Facebook, LinkedIn....
300
Wherever there is control, authority, or protection, you might consider that 'area' to be a this cybersecurity term.
What is domain
400
From my laptop, I transferred $10 million to my bank account using victim account numbers and PINs after viewing recordings of victims entering the numbers
What is Black Hat.
400
This attack uses many systems to flood the resources of a target, thus making the target unavailable.
What is DDoS. (distributed denial of service)
400
This type of sophisticated cyber attack is a continuous computer hack that occurs under the radar against a specific object, usually used for business or political motives.
What is an APT (advanced persistent threat)
400
This agency is responsible for intelligence collection and surveillance activities in the United States
What is the NSA (National Security Agency)
400
Groups of professional criminals focused on control, power, and wealth.
What is cyber criminals.
500
During my research for security exploits, I stumbled across a security vulnerability on a corporate network that I am authorized to access.
What is white hat.
500
This type of an attack can disable a computer by forcing it to use memory or by overworking its CPU.
What is an algorithm attack
500
This refers to multiple enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
What is Federated identity management.
500
The workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence
What is Analyze
500
Make political statements to create awareness to issues that are important to them and publicly publish embarrassing information about their victims.
What is Hacktivist