What 1995 movie involves a group of teenage hackers who must prove a sinister superhacker is framing them for a plot to embezzle funds from a large oil company.
Hackers
The basic elements of a strong password recommended by expert includes a combination of upper case and lowercase letters, numbers, and __________.
Symbols/Special Characters
What movie was shown in Congress by Representative Dan Glickman, as part of his presentation of a 1983 anti-hacking bill that would lead to the creation of the Computer Fraud and Abuse Act of 1984?
WarGames
Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This attack is called __________.
Ransomware
What 1995 movie is about a computer expert who discovered secret information on a disk she received from a friend that leads to her records being erased and receiving a new identity?
The Net
What popular hacker tool can now be used to conduct security assessments on hardware, such as the Controller Area Network (CAN) bus in modern cars, IoT devices, and industrial control systems, thanks to a new Hardware Bridge API?
Metasploit
What movie centers around a high-tech villain who is the leader of a covert counter-terrorist unit, Black Cell, and a super hacker convicted by the FBI but who is trying to stay clean?
Swordfish
Provides standardized policies for cybersecurity and information assurance, procedures, and implementation guidance for use in the management of systems at all classification levels under the purview of the SAP Authorizing Official (AO).
Joint SAP Implementation Guide
What language was created by hackers to communicate covertly on websites, newsgroups, etc. (i.e. 1 4m 3l1t3)
l33t speak