The mailing address for your computer on the Internet.
What is an Internet Protocol address?
This is a type of memory on your computer that you can only read.
What is read only memory?
This basic cipher involves shifting every letter in the plaintext the same amount.
What is Caesar cipher?
This attack involves a Nigerian Prince sending you an email for a vast sum of money.
What is phishing?
The course code for the introductory undergraduate cybersecurity class at Stony Brook University.
What is CSE 331?
This keeps your packets safe when they go from computer to computer.
What is Transport Layer Security?
This is a more modern method of booting up computers that has replaced BIOS.
What is UEFI/EFI?
This type of math is commonly used in the field of cryptography.
This is what impersonating a legitimate service in order to gain people's trust fraudulently is called.
What is spoofing?
The names of the creators of RSA.
Who are Ron Rivest, Adi Shamir, and Leonard Adleman?
This type of attack involves being in the middle of two entities communicating with each other.
What is a man in the middle attack?
This common security vulnerability involves exceeding memory capacity.
What is a buffer overflow?
This type of symmetric encryption is the foundation for securing almost all communication across the Internet.
What is Diffie-Hellman Secret Sharing?
These services are commonly used by websites to ensure that they don't get overloaded.
What is a Content Delivery Network?
The name of the British communications and signals intelligence agency. Bonus points if you know the full form.
What is Government Communications Headquarters (GCHQ)?
Disabling this caused Facebook and Facebook products to vanish off the Internet for almost 6 hours in 2021.
What is Border Gateway Protocol?
This type of attack gets your computer a little chilly to retrieve data from the RAM.
What is a cold boot attack?
The requirement for this microcontroller, which handles cryptography functions, got a lot of people in a huff when trying to install Windows 11.
What is Trusted Platform Module/TPM?
This attack usually involves dumping a bunch of information using cleverly placed syntax.
What is SQL injection?

What is Cicada 3301?
This was the name of a severe SSL vulnerability that caused servers to bleed out more data than they were asked for.
These devastating and nearly impossible to patch vulnerabilities were discovered in all pre-2019 x86 microprocessors.
Spectre and Meltdown
This sculpture, which sits at the headquarters of the Central Intelligence Agency, contains a cipher that has still not been decrypted.
What is Kryptos?
In 2017, this type of exploit allowed users of Valve Software's Steam client to view other people's profile info pages, and potentially access their Steam funds.
What is Cross-Site Scripting?
This poet was the first to use a simple substitution cipher in his work.
Who is Edgar Allan Poe?