Software that automatically displays or downloads advertisements when it is used.
What is Adware?
An access control tool designed and restricted to a physical space, which is separated from the adjoining spaces (rooms) by two doors, usually an exit and an entry door that cannot be unlocked at the same time
What is a man trap?
In 2014, this US Government organization announced it had suffered a data breech which revealed personal data for more than 22 million federal employees.
Who is OPM?
A type of email-based social engineering attack, in which the attacker sends email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim
What is Phishing?
A software or hardware device that protects a system or network by blocking unwanted network traffic
What is a Firewall?
Software that enables an attacker to take control of a user's system or data and to demand payment for return of that control
What is Ransomware?
A metallic enclosure that prevents the entry or escape of an electromagnetic field (EM field)
What is Faraday cage?
This credit bureau announced in 2017 that is was a victim of a data breach which exposed social security numbers for more than 143 million people
Who is Equifax?
A network-based attack where an attacker scans computers and other devices to see which ports are listening, in an attempt to find a way to gain unauthorized access
What is a port scanner attack?
A type of network isolation that physically separates a network from all other networks.
What is an Air Gap?
Surreptitiously installed malware that is intended to track and report the usage of a target system or collect other data the attacker wishes to obtain
What is spyware?
A TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
What is CCTV?
This well known department store suffered a data breach, through its POS systems, in 2014, that exposed credit card information for more than 56 million of its customers
Who is Home Depot?
A type of network-based attack that combines a man-in-the-middle attack with the use of a Trojan horse to intercept and modify web transactions in real time
What is a Man-in-the-browser attack?
An active, inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it
What is a NIPS?
A type of malware that hides itself on an infected system and can cause damage to a system or give an attacker a platform for monitoring and/or controlling a system
What is Trojan horse?
a short post embedded into a street or sidewalk, typically used to restrict vehicle access to doors.
What are bollards?
A massive data breach at this public email provider in 2016 in currently the largest known data breach, impacting a staggering 3 billion people world wide
Who is Yahoo mail?
A type of password attack where an attacker uses a set of related plaintext passwords and their hashes to crack passwords
What is a Rainbow Table Attack?
A server that can issue digital certificates and the associated public/ private key pairs.
What is a Certificate Authority?
A self-replicating piece of malicious code that spreads from computer to computer by attaching itself to different files
What is a virus?
A mechanism used to authenticate and provide access to a facility or system based on the automatic and instant verification of an individual's physical characteristics.
What are biometrics?
This mysterious computer worm nearly caused a melt down in a nuclear weapons facility in Iran. This worm disabled critical cooling systems that ultimately led to the destruction of over 900 uranium centrifuges
What is Stuxnet?
A cryptographic attack where the attacker intercepts session keys or authentication traffic and uses them later to authenticate and gain access
What is a replay attack?
A small section of a private network that is located behind one firewall or between two firewalls and made available for public access
What is a DMZ?