What does 'Zero Trust' mean?
A security model that requires verification for every person and device trying to access resources.
What is 'Defense in Depth'?
A security strategy that uses multiple layers of defense to protect systems.
What is 'Shared Responsibility Model'?
A cloud security framework where both the cloud provider and customer share security responsibilities.
What happened in the 'Equifax Breach'?
A data breach in 2017 that exposed personal information of 147 million people.
What is 'Red Teaming'?
A security practice where a group simulates attacks to test defenses.
Define 'Firewall'.
A network security device that monitors and filters incoming and outgoing network traffic.
Define 'Least Privilege'.
A principle that restricts access rights for users to the bare minimum necessary.
Define 'Encryption at Rest'.
The practice of encrypting data stored on physical media to protect it from unauthorized access.
Explain the 'Yahoo Breach'.
A series of data breaches from 2013 to 2016 that affected 3 billion user accounts.
Define 'Blue Team'.
A group responsible for defending against attacks and ensuring security.
What is 'Microsegmentation'?
A security technique that divides a network into smaller segments to reduce attack surfaces.
Explain 'Separation of Duties'.
A security principle that divides responsibilities to prevent fraud and errors.
Explain 'Multi-Factor Authentication'.
A security process that requires multiple forms of verification before granting access.
What is the national animal of Scotland?
Unicorn.
Explain 'Penetration Testing'.
A security testing method where simulated attacks are performed to identify vulnerabilities.
Explain 'IAM'.
Identity and Access Management, a framework for managing digital identities and access rights.
What is 'Fail-Safe Defaults'?
A design principle where access is denied by default and granted only when explicitly allowed.
What is 'CASB'?
Cloud Access Security Broker, a security policy enforcement point between cloud service consumers and providers.
Define the 'Sony Pictures Hack'.
A cyber attack in 2014 that led to the leak of confidential data and unreleased films.
What is the only mammal capable of true flight?
Bat.
What color is an aircraft’s black box?
Orange.
Define 'Economy of Mechanism'.
A principle that advocates for simple and small security mechanisms to reduce errors.
Define 'Serverless Security'.
Security practices and measures for applications running in serverless environments.
What is the 'Marriott Breach'?
A data breach in 2018 that exposed personal information of 500 million guests.
Define 'Threat Hunting'.
The proactive search for cyber threats within a network or system.