Malware
CIA TRIAD
Attacks
Commands
Mystery
100


This type of malware erases user data and ensures it can’t be recovered. An example of this type of malware is WhisperGate, which targeted Ukrainians and contained three components, two of them being a bootloader that corrupts detected local disks and a Discord-based downloader.



What is a wiper?

100

These are the three pillars of cybersecurity, in this specific order: the protection of information quality, the protection of authorization, and the protection of access to authorized users?


What is integrity, confidentiality and availability? 


100

This form of malware tracks and records the keystrokes a user makes to retrieve data such as passwords, bank account information, and other sensitive information.


What is keylogging?


100

What is cd?


This command allows users to change the current working directory on their OS, and is the same command in Linux and Unix.


100

What is a firewall?

This network security system monitors and controls incoming and outgoing traffic based on predetermined security rules. Its primary function is to prevent unauthorized access while allowing legitimate communication.

300


This type of malware gives malicious actors remote control of a victim’s computer with full administrative privileges. An example of this type of malware is Machiavelli, which attacked MAC OS X by creating hidden system calls and kernel threads.


What is a rootkit?

300


These pillars of cybersecurity are compromised when Katie reads her journal and sets it on fire.



What are integrity, and availability? 


300


This type of attack allows the hacker to bypass normal security measures and access a computer system. In 2014, Wordpress plug-ins were found to have Javascript code that opened up many of these in its system. 



What is a back door?


300

What is tar?

This command allows users to expand and compress files in Linux.

300


What is does rm -rf /* do?


This command removes everything from the root directory.

500

What is WannaCry?

This 2017 attack targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.

500


Although it is unclear as to who created the concept of the CIA triad, this prominent war general and statesman, who has a cryptographic cipher named for him, utilized its principles during his reign.


Who is Julius Caesar?

500

This term refers to a computer system that intentionally tries to entice cyberattacks and acts as a decoy for hackers.


What is a Honeypot?


500

What is echo?

This command is used to pass and display lines of text and strings that are passed as arguments to the terminal.

500

What is Kali? 

This operating system runs a distribution of Linux, and is designed for digital forensics and penetration testing.