Web Wonders
Social Engineering Shenanigans
Bug Bounty Hunters
Password Problems
PII Protection Patrol
100

This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users.

What is cross-site scripting or XSS?

100

This type of scam involves fake emails to trick users into revealing personal information.

What is phishing?

100

Companies often offer these programs to reward people who find and report vulnerabilities.

What is a bug bounty?

100

This policy encourages users to create complex passwords using letters, numbers, and symbols.

What is password complexity?

100

This is the full form of PII, a term for data that can identify a person.

What is Personally Identifiable Information?

200

This type of attack targets web applications to manipulate the database through user inputs

What is SQL injection?

200

A social engineering technique where attackers plan to pose as someone trusted to gain access

What is pretexting?

200

This ranks vulnerabilities by severity, providing a risk-based scoring.

What is CVSS or Common Vulnerability Scoring System?

200

An attacker uses a list of common passwords to try and gain unauthorized access.

What is a dictionary attack?

200

This type of data includes items like fingerprints or facial recognition patterns.

What is biometric data?

300

This common security flaw arises from not properly validating user inputs, often leading to exploits.

What is input validation failure?

300

Attackers pretend to be part of an organization’s internal team to gain trust and access

What is impersonation?

300

A vulnerability allowing attackers to execute arbitrary code on a system is known as this.

What is remote code execution?

300

This type of storage method is used to store password hashes securely in databases.

What is hashing?

300

A common identifier found on a driver’s license that’s considered sensitive PII.

What is TRN (Tax Registration Number)? 

400

This security measure protects user sessions from hijacking by verifying session integrity

What is session management?

400

This psychological tactic is used to make victims feel rushed and reveal sensitive information. 

What is urgency?

400

The security practice of isolating an application from the rest of the system to contain threats.

What is sandboxing?

400

This security feature sends a code to a secondary device for authentication.

What is multi-factor authentication?

400

This regulation, effective in the EU, gives people control over how their personal data is used.

What is GDPR?

500

This attack involves redirecting users to a malicious website through a compromised URL.

What is URL spoofing?

500

This advanced social engineering tactic targets high-ranking executives in an organization

What is whaling?

500

This vulnerability involves inserting malicious code into a website, affecting users’ browsers.

What is cross-site scripting or XSS?

500

This type of passwordless authentication relies on unique physical characteristics.

What is biometric authentication?

500

This term describes the process of removing or masking PII to protect individuals’ privacy.

What is data anonymization or data masking?