CIA
Attacks
Threat Model
Ports
Sneaky Extra
100

In the CIA Triad, this element, represented by the letter "C", ensures that sensitive information is only accessible to authorized users.

Confidentiality

100

Name 1 cybersecurity attack?

Board decides

100

What are 2 assets in a coffee shop?

Wifi

Coffee/Food

Empoyees

Reputation

POS Systems/Card info

100

What is port 22?

SSH - Secure Shell

100

n cybersecurity, this pair of terms refers to teams where one simulates attacks to test defenses, and the other defends against those attacks to improve security.

Red Team

Blue Team

200

In the CIA Triad, this element, represented by the letter ‘I,’ ensures that data is accurate, trustworthy, and hasn’t been tampered with

Integrity

200

What does IoC stand for?

Indicators of Compromise

200

Open ports, web application login pages, API endpoints, IoT devices, cloud storage, and employee email accounts are all examples of this part of a system that an attacker could potentially exploit.

Attack Surface

200

What is port 80?

HTTP - Hypertext Transfer Protocol

200

Name 3 roles in cybersecurity

Cybersecurity Analyst, Cybersecurity Architect, Cybersecurity Engineer, Cloud Security, Threat Intel, Threat Hunter, Digital Forensics  

Penetration Tester, Network Security, Web Security, IoT Security

300

By requiring multi-factor authentication (MFA) for login, a company is primarily protecting this element of the CIA Triad.

Confidentiality

300

This type of attack makes a system unavailable by overwhelming it with traffic from a single computer, and when multiple computers are used simultaneously to do the same thing, it is called this more powerful version.

DDoS (Distributed Denial of Service)

300

List 3 threat actors

Cybercriminals, Competitors, Employees, Hacktivist, Script Kiddies

300

What is a port?

What service you are trying to invoke on your computer



300

A user logs into their work computer using a password and then verifies their identity with a fingerprint scan. What 2  type of authentication is this MFA using?

Something you know and Something you Are

400

This element of the CIA Triad is directly affected when a DDoS attack floods a network or server, making services unavailable to legitimate users

Availability

400

Unlike a regular hacker who is often opportunistic, this type of threat actor is highly skilled, well funded, and conducts long term, targeted attacks to steal sensitive information or disrupt systems

An APT (Advanced Persistent Threat) 

400

An employee clicked a malicious link in an email, giving attackers access to the company’s internal network. This mitigation technique could have helped prevent the breach.

Employee Awareness Training

400

Unlike Telnet, which sends data in plain text, this network protocol encrypts all communications between a client and a server, making it the preferred choice for secure remote access.

SSH (Secure Shell)

400

This acronym, CVE, is used to identify and catalog publicly known cybersecurity vulnerabilities in software and hardware.

Common Vulnerabilities and Exposure?

500

The hospital’s systems went offline briefly, but looking deeper what was found was that someone tampered with the patient files, impacting this core principle of the CIA Triad.

Integrity

500

This type of web attack, abbreviated as ____, tricks a user’s browser into performing unwanted actions on a site where they are authenticated, like changing a password or making a transaction without their knowledge.

Cross Site Request Forgery


500

This type of threat actor often engages in covert operations like reverse engineering products, analyzing internal communications, or exploiting vendor relationships to acquire proprietary information from rival companies

Competitor

500

Unlike HTTP, this type of encryption is used in HTTPS to secure data transmitted between a user’s browser and a web server, typically involving a combination of asymmetric encryption for key exchange and symmetric encryption for data transfer.

TLS or SSL

500

“SIEM collects and analyzes security logs, SOAR automates responses to threats, and an EDR's main point is what

To monitor and protect endpoints (computers, phones, tablets)