Malware
CIA TRIAD
Attacks
Commands
Mystery
100

This type of malware erases user data and ensures it can’t be recovered. An example of this type of malware is WhisperGate, which targeted Ukrainians and contained three components, two of them being a bootloader that corrupts detected local disks and a Discord-based downloader.

What is a wiper?

100

These are the three pillars of cybersecurity, in this specific order: the protection of information quality, the protection of authorization, and the protection of access to authorized users.

What is integrity, confidentiality and availability?

100

This form of malware tracks and records the keystrokes a user makes to retrieve data such as passwords, bank account information, and other sensitive information.

What is keylogging?

100

This command allows users to change the current working directory on their OS, and is the same command in Linux and Unix.

What is cd?

100

This network security system monitors and controls incoming and outgoing traffic based on predetermined security rules. Its primary function is to prevent unauthorized access while allowing legitimate communication.

What is a firewall?

300

This type of malware gives malicious actors remote control of a victim’s computer with full administrative privileges. An example of this type of malware is Machiavelli, which attacked MAC OS X by creating hidden system calls and kernel threads

What is a rootkit?

300

These pillars of cybersecurity are compromised when Katie reads her journal and sets it on fire.

What are integrity, and availability?

300

This type of attack allows the hacker to bypass normal security measures and access a computer system. In 2014, Wordpress plug-ins were found to have Javascript code that opened up many of these in its system.

What is a back door?

300

This command allows users to expand and compress files in Linux.

What is tar?

300

This command removes everything from the root directory. (Drive wipe.)

What is does rm -rf /* do?

500

This 2017 attack targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.

What is WannaCry?

500

Although it is unclear as to who created the concept of the CIA triad, this prominent war general and statesman, who has a cryptographic cipher named for him, utilized its principles during his reign.

Who is Julius Caesar?

500

This term refers to a computer system that intentionally tries to entice cyberattacks and acts as a decoy for hackers.

What is a Honeypot?

500

This command is used to pass and display lines of text and strings that are passed as arguments to the terminal.

What is echo?

500

This operating system runs a distribution of Linux, and is designed for digital forensics and penetration testing.

What is Kali?