The first worm to spread extensively "in the wild"
MORRIS WORM
An American whistle-blower who copied and leaked highly classified information from the National Security Agency in 2013 when he was a Central Intelligence Agency employee and subcontractor.
EDWARD SNOWDEN
inrgttyie
INTEGRITY
The process of identifying a person, system or piece of information, and the veracity of information provided.
AUTHENTICATION
An IoT botnet famous for launching DDoS attacks on Dyn DNS and Brian Kreb's website
MIRAI
Widely viewed as the most advanced form of malware ever created, this malware targeted Industrial Control Systems
STUXNET
A convicted hacker turned author and security consultant. Best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes.
KEVIN MITNICK
tales vrpeiglie
LEAST PRIVILEGE
This offers safeguards against a disaster, and outlines the strategies, action plan on how to continue business as usual in the event of any disaster.
BUSINESS CONTINUITY PLAN
The process of creating multiple layers of security to protect electronics and information resources against attackers.
DEFENSE IN-DEPTH
Named after a famous tennis player, this virus was spread by emails to the contacts in the compromised address book of Microsoft Outlook.
ANNA KOURNIKOVA
A decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several government institutions and government agencies, corporations, and the Church of Scientology.
ANONYMOUS
oslrimpmpohy
POLYMORPHISM
______ is the technique used for filtering of outgoing network traffic.
EGRESS FILTERING
The port number of Internet Message Access Protocol (IMAP) over SSL
993
This botnet was used to distribute many pieces of malware, most notably Locky ransomware.
NECURS
In the summer of 2016, they published several leaks of some of the National Security Agency (NSA) hacking tools.
SHADOW BROKERS
iitaudoronnenp
NONREPUDIATION
______ defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.
ATTRIBUTE BASED ACCESS CONTROL
Single-domain SSL (Secure Sockets Layer) certificates that offer the highest degree of authentication and SSL protection.
EXTENDED VALIDATION (EV) CERTIFICATES
First seen in 2016, this ransomware was spread via an aggressive phishing campaign and leveraged the dridex infrastructure to target hospitals in the US.
LOCKY
The authors of the "Lizard Stresser" tool, an online service that allowed paying customers to launch attacks capable of taking Web sites offline for up to eight hours at a time.
LIZARD SQUAD
eostencomirnitgam
MICROSEGMENTATION
A key agreement protocol based on asymmetric cryptography that ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the private keys is compromised in the future.
PERFECT FORWARD SECRECY
A form of encryption that allows computation on ciphertexts, generating an encrypted result which, when decrypted, matches the result of the operations as if they had been performed on the plaintext.
HOMOMORPHIC ENCRYPTION