Cybersecurity Terminology
Data Privacy and Compliance
Cybersecurity in Pop Culture
Cyber Threat Intelligence
Secure Coding Practices
200

This term refers to a type of cyberattack where an attacker attempts to gain unauthorized access to a system by repeatedly trying different password combinations.

What is a brute force attack?

200

This data protection regulation, enacted in the European Union, is known for its strict rules regarding the handling of personal data.

What is GDPR (General Data Protection Regulation)?

200

In this 1995 film, a computer hacker helps bring down a rogue AI that threatens humanity.

What is "Hackers"?

200

This term refers to the deliberate spreading of false or misleading information to deceive and manipulate individuals, often used as a cyber warfare tactic. 

What is disinformation?

200

This is the secure coding practice of ensuring that input data is properly validated and sanitized to prevent security vulnerabilities. 

What is input validation?

400

This is the practice where an organization sets up a fake environment to deceive and divert attackers away from the real network. 

What is a honeypot?

400

This federal law in the United States requires organizations to notify individuals of data breaches involving their personal information.

What is the Health Insurance Portability and Accountability Act (HIPAA)?

400

This critically acclaimed TV series known for its portrayal of hacking and cybersecurity, the protagonist, Elliot Alderson, is a cybersecurity expert and vigilante hacker.  

What is "Mr. Robot"?

400

This organization, founded in 1947, provides cybersecurity expertise and collaborates with government agencies and private sector companies to mitigate cyber threats. 

What is the NSA (National Security Agency)?

400

In secure coding, This is the term for a vulnerability that occurs when an application does not properly handle or sanitize user-supplied data, potentially allowing attackers to execute malicious code. 

What is a code injection vulnerability (e.g., SQL injection or OS command injection)?

600

This is the term for the act of convincing individuals to disclose sensitive information by pretending to be a trusted entity. 

What is social engineering?

600

Under the GDPR, organizations may be required to appoint this role, responsible for ensuring compliance with the regulation and serving as a point of contact for data subjects and authorities. 

What is the Data Protection Officer (DPO)?

600

In this 1999 novel by Neal Stephenson, a computer hacker and a cryptographer investigate a conspiracy involving classified information.

What is "Cryptonomicon"?

600

This U.S. government agency serves as a hub for collecting and sharing cybersecurity threat information.

What is CISA (Cybersecurity and Infrastructure Security Agency)?

600

This is the practice of regularly reviewing and analyzing source code to identify and fix security vulnerabilities?

What is code review or static analysis?

800

This is the term for a piece of code or software that appears to be legitimate but is actually malicious and performs harmful actions on a system, often without the user's knowledge.

What is a Trojan horse or Trojan?

800

This regulation, enacted in California, grants consumers the right to request that a business delete their personal information and not sell it.

What is the California Consumer Privacy Act (CCPA)?

800

This 1983 film starring Matthew Broderick features a young computer whiz who accidentally hacks into a military supercomputer. 

What is "WarGames"?

800

In the context of cyber threat intelligence, this is the term for information that identifies specific tactics, techniques, and procedures (TTPs) used by cyber adversaries to carry out attacks. 

What are Indicators of Compromise (IOCs)?

800

This widely recognized and secure coding guideline consists of a set of best practices designed to prevent security vulnerabilities in software development. 

What is the OWASP Top Ten?

1000

This term refers to the deliberate practice of sending targeted deceptive emails or messages that appear to come from a trustworthy source to trick individuals into revealing sensitive information or taking malicious actions.

What is spear phishing?

1000

Under the GDPR, this is the maximum fine that can be imposed on organizations for the most serious violations, such as data breaches and failure to obtain proper consent. 

What is €20 million or 4% of the company's global annual revenue, whichever is higher?

1000

This is a cybersecurity-themed techno-thriller novel by William Gibson, often credited with popularizing the term "cyberspace"?

What is "Neuromancer"?

1000

This intelligence collection method involves gathering information about cyber threats from publicly available sources, such as news articles, blogs, and social media, to analyze and anticipate potential risks. 

What is Open Source Intelligence (OSINT)?

1000

In secure coding, this is the principle that advocates that "the security of a system should not depend on the secrecy of the design or implementation" and encourages transparency about security mechanisms and protocols. 

What is Kerckhoffs's Principle (also known as Shannon's Principle)?