A programmable device that can process data and perform tasks.
What is a computer?
Software that scans a user's computer to spot, isolate, and delete known malware threats.
What is an antivirus?
A scam which deceives people into revealing information or installing malware, most commonly done through email.
What is phishing?
A substitution cipher that shifts letters in a message.
What is the Caesar cipher?
What is fault injection.
An organization which provides services for accessing the internet.
What is an ISP?
This encrypts a user's internet traffic and routes it through a server in another location.
What is a virtual private network (VPN)?
A type of attack which renders a system inoperable, often by flooding it with requests.
What is denial of service?
A method of password cracking that tries all possible combinations until one works.
What is Brute forcing?
A type of fault injection technique on rows of bits adjacent to a target row to control the bits in the target row.
What is a Rowhammer attack?
Facts or statistics collected together for reference or analysis.
What is data?
A network security device that monitors and controls incoming and outgoing traffic from a computer network.
What is a firewall?
A type of malware-based attack which encrypts a user's files, rendering them useless, until the attacker is paid.
What is ransomware?
A method of encryption where each letter of plaintext is encoded with a different Caesar cipher.
What is the Vigenère cipher?
Similar to brute forcing, this attack "guesses" an encryption key and measures the power consumption to validate each bit.
What is Differential power analysis?
A device that connects two or more IP networks and manages traffic between them.
What is a router?
A type of security training that educates humans on cybercrime threats and equips them with tools to prevent attack.
What is end-user education?
A type of malware which deletes vast amounts of data from the host's device, often rendering it inoperable.
What is the I love you virus?
The most common modern encryption technique, it uses a public key for encryption, and personalized keys for decryption.
What is asymmetric encryption?
The process of removing the cover on a chip or integrated circuit on a printed circuit board, usually using acid.
What is decapsulation?
A specialized software system that provides services, data, or resources to other computers over a network
What is a server?
A security method which requires two types of evidence to verify your identity online.
What is two-factor (or dual-factor) authentication?
A type of information leak due to someone copying data from an insecure communication.
What is a man-in-the-middle attack?
A sculpture located at the CIA headquarters containing three solved encrypted inscriptions, and one unsolved.
What is Kryptos?
A type of side channel attack, this exploits speculative execution of processors to gain information.
What is a spectre attack?