Malware Madness
Gone Phishing
Crypto-Nite
Byte-sized Vulnerability
Law and Order Cyber edition
100

This cybersecurity measure involves regularly updating software and systems to patch vulnerabilities and protect against known malware threats.

What is patch management?

100

This type of social engineering attack involves a cybercriminal posing as a legitimate entity, often through email, to deceive individuals into revealing sensitive information or performing actions they shouldn't.

What is phishing

100

This fundamental concept in cryptology involves the process of converting plaintext into ciphertext, making it unreadable to anyone without the proper decryption key.

What is encryption?

100

This term refers to a previously unknown software vulnerability that is exploited by attackers before the software vendor has a chance to release a patch.

What is a zero-day vulnerability?

100

This legal term refers to written or printed false statements that harm the reputation of an individual or entity, and it's a common issue in the context of online communication.

What is libel?

200

This type of malware encrypts a victim's files or systems and demands a ransom for the decryption key.

What is ransomware?

200

This is a highly targeted phishing attack - aimed at senior executives - masquerading as a legitimate email.

What is whaling?

200

This type of key in asymmetric encryption is available and is used for encryption, while its corresponding private key is kept secret and used for decryption.

What is the public key?

200

This term describes the practice of discovering and reporting zero-day vulnerabilities to the affected software vendor, often done by security researchers and ethical hackers.

What is responsible disclosure?

200

Under the U.S. Computer Fraud and Abuse Act, what term is used to describe the unauthorized access or exceeding authorized access to a computer system?

What is hacking

300

Released in the early 1970s, this was one of the earliest known computer worms that spread across the ARPANET, displaying a message that read 'I'm the creeper, catch me if you can!'

What is the Creeper worm?

300

The fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.

What is Smishing?

300

This type of attack attempts to discover a cryptographic key by trying all possible combinations until the correct one is found.

What is a brute force attack?

300

This class of vulnerability occurs when a software program runs with higher privileges than necessary, potentially allowing attackers to gain unauthorized access.

What is a privilege escalation vulnerability?

300

What landmark U.S. legislation, enacted in 2002, requires public companies to implement and maintain effective internal controls for financial reporting, including cybersecurity measures?

What is the Sarbanes-Oxley (SOX) Act?

400

A group of computers infected with the same type of malware, controlled by a single entity, is often referred to as this term, which is commonly used for conducting coordinated cyber attacks.

What is a botnet?

400

In social engineering, this term refers to the tactic of building trust and rapport with a target in order to manipulate them into providing confidential information.

What is pretexting?

400

Widely used for securing internet communications, this cryptographic protocol ensures that data transmitted between a web browser and a website remains confidential and tamper-proof.

What is Transport Layer Security (TLS)?

400

This widely used Java-based logging library became notorious in late 2021 for a critical vulnerability, allowing attackers to execute arbitrary code remotely, leading to widespread concerns across the cybersecurity community.

What is Log4j?

400

This European Union regulation, implemented in 2018, imposes strict requirements on how organizations handle and protect personal data.

What is the General Data Protection Regulation (GDPR)?

500

Considered one of the worst malware outbreaks in history, this worm, which targeted Microsoft Windows systems, spread rapidly in 2003 by exploiting a critical vulnerability, causing massive disruptions worldwide.

What is the Blaster worm (or MSBlast)?

500

This is the number of social engineering emails that are sent worldwide every single day. 

What is 3.4 Billion

500

This widely used symmetric-key encryption algorithm, known for its efficiency and security, was developed by Belgian cryptographers Vincent Rijmen and Joan Daemen.

What is the Advanced Encryption Standard (AES)?

500

In 2014, a major security flaw was discovered in the OpenSSL cryptographic software library, exposing sensitive information like usernames and passwords. This vulnerability was dubbed as what?

What is heartbleed?
500

Enacted in 1986, this U.S. federal law provides privacy protections for electronic communications and regulates the interception and disclosure of wire, oral, and electronic communications

What is the Electronic Communications Privacy Act (ECPA)?