Crypto Craze
Firewall Follies
Phishy Business
Hack 'n' Slash
The Breach Report
100

The process of converting plaintext into unreadable code.

What is encryption?

100

A security software that acts as a gatekeeper for network traffic

What is a firewall?

100

Fraudulent emails designed to steal personal information

What is phishing?

100

This type of attack overwhelms a network, making services unavailable to users.

What is a DDoS attack?

100

In 2013, this major retail company suffered a data breach exposing credit card details

What is Target?

200

This cryptographic method uses two keys: a public key and a private key.

What is asymmetric encryption?

200

This policy limits user access rights to only what is needed for their role.

What is the principle of least privilege?

200

Impersonating someone’s boss to gain information or access.

What is spear phishing?

200

This malware disguises itself as legitimate software but performs malicious actions in the background

What is a Trojan?

200

The first step in incident response, aimed at identifying and confirming a breach.

What is detection?

300

The most common hash function used in cybersecurity, creating a 256-bit hash

What is SHA-256?

300

This detection tool analyzes traffic to identify suspicious patterns

What is an IDS or Intrusion Detection System?

300

This attack involves tricking someone into revealing private information over the phone.

What is vishing?

300

Attackers use this technique to guess a password by testing all possible combinations.

What is brute-force attack?

300

In 2017, this massive credit agency experienced a breach affecting over 140 million Americans. 

What is Equifax?

400

The technique of hiding messages within other files, often images or audio

What is steganography?

400

A security technique used to separate critical systems from untrusted networks.

What is network segmentation?

400

A sophisticated scam targeting top-level executives.

What is whaling?

400

This attack intercepts communication between two parties without their knowledge.

What is a man-in-the-middle attack?

400

This term describes a security weakness that allows unauthorized access.

What is a vulnerability?

500

Named after a Greek historian, this cipher technique shifts letters in the alphabet

What is Caesar cipher?

500

his protocol ensures secure data transmission over the internet, often seen with “https.”

What is SSL/TLS?

500

This redirection attack tricks users into entering credentials on a fake website.

What is pharming?

500

The method of tricking DNS servers into sending users to fake websites.

What is DNS spoofing?

500

This breach in 2021 targeted multiple software supply chains, affecting companies worldwide.

What is the SolarWinds breach?