Attacks
Tools & Tech
Policy
WiCyS
Cyber Basics
100

This attack tricks users into revealing sensitive information through fake emails or messages.

What is phishing?  

100

A command-line tool used to display and configure network interfaces.

What is ifconfig (or ip command)?

100

This U.S. agency is responsible for defending federal networks and supporting national cybersecurity.

What is CISA (Cybersecurity and Infrastructure Security Agency)?

100

This is the year that WiCyS was founded. 

What is 2012?

100

A unique address assigned to a device on a network.

What is an IP address?

200

Malware that spreads itself automatically across networks without user interaction.

What is a worm?

200

A Linux distribution specifically designed for penetration testing.

What is Kali Linux?

200

A regulation focused on protecting personal data of EU citizens.

What is GDPR?

200

Each year, WiCyS brings together students, academics, and industry professionals at this event.

What is WiCyS National Conference?

200

The protocol used to send email over the internet.

What is SMTP?

300

An attack that injects malicious code into a website to run in a user’s browser.

What is Cross-Site Scripting (XSS)?

300

A security solution that correlates alerts from multiple sources to detect threats.

What is a SIEM?

300

A U.S. framework that provides guidelines for managing privacy risks.

What is the NIST Privacy Framework?

300

This program within WiCyS pairs professionals with students to provide career guidance and support.

What is the WiCyS Mentorship Program?

300

The process of confirming a user’s identity.

What is authentication?

400

An attack that redirects users from a legitimate website to a fake one.

What is DNS spoofing (or DNS poisoning)?

400

A tool used to automate vulnerability scanning of systems and applications.

What is Nessus?

400

The NIST Cybersecurity Framework is built around these five core functions: Identify, Protect, Detect, Respond, and this.

What is Recover?

400

This woman founded the Women in CyberSecurity (WiCyS) organization in 2012.

Who is Dr. Ambareen Siraj?

400

This type of cryptography uses two keys: a public key and a private key. 

What is asymmetric encryption? 

500

A vulnerability that allows attackers to execute code before a patch is available.

What is a zero-day exploit?

500

A framework used to emulate adversary behavior for defensive testing.

What is MITRE CALDERA?

500

A compliance standard required for organizations that handle credit card information.

What is PCI DSS?

500

WiCyS was founded at this U.S. university.

What is Tennessee Tech University?

500

A security principle that assumes breaches will happen and designs systems accordingly.

What is defense in depth?