Network and Assets
Cyber Defenses
Remote Attacks
Encryption
Hardware Attacks
100

A programmable device that can process data and perform tasks.

What is a computer?

100

Software that scans a user's computer to spot, isolate, and delete known malware threats.

What is an antivirus?

100

A scam which deceives people into revealing information or installing malware, most commonly done through email.

What is phishing?

100

A substitution cipher that shifts letters in a message.

What is the Caesar cipher?

100
Not inherently an attack, this induces failure in a system, usually to bypass security.

What is fault injection.

200

An organization which provides services for accessing the internet.

What is an ISP?

200

This encrypts a user's internet traffic and routes it through a server in another location.

What is a virtual private network (VPN)?

200

A type of attack which renders a system inoperable, often by flooding it with requests.

What is denial of service?

200

A method of password cracking that tries all possible combinations until one works.

What is Brute forcing?

200

A type of fault injection technique on rows of bits adjacent to a target row to control the bits in the target row.

What is a Rowhammer attack?

300

Facts or statistics collected together for reference or analysis.

What is data?

300

A network security device that monitors and controls incoming and outgoing traffic from a computer network.

What is a firewall?

300

A type of malware-based attack which encrypts a user's files, rendering them useless, until the attacker is paid.

What is ransomware?

300

A method of encryption where each letter of plaintext is encoded with a different Caesar cipher.

What is the Vigenère cipher?

300

Similar to brute forcing, this attack "guesses" an encryption key and measures the power consumption to validate each bit.

What is Differential power analysis?

400

A device that connects two or more IP networks and manages traffic between them.

What is a router?

400

A type of security training that educates humans on cybercrime threats and equips them with tools to prevent attack.

What is end-user education?

400

A type of malware which deletes vast amounts of data from the host's device, often rendering it inoperable.

What is the I love you virus?

400

The most common modern encryption technique, it uses a public key for encryption, and personalized keys for decryption.

What is asymmetric encryption?

400

The process of removing the cover on a chip or integrated circuit on a printed circuit board, usually using acid.

What is decapsulation?

500

A specialized software system that provides services, data, or resources to other computers over a network

What is a server?

500

A security method which requires two types of evidence to verify your identity online.

What is two-factor (or dual-factor) authentication?

500

A type of information leak due to someone copying data from an insecure communication.

What is a man-in-the-middle attack?

500

A sculpture located at the CIA headquarters containing three solved encrypted inscriptions, and one unsolved.

What is Kryptos?

500

A type of side channel attack, this exploits speculative execution of processors to gain information.

What is a spectre attack?