Vulnerabilities
System Hardening
Threat Modeling
Bits, Binary, and Encoding
Cryptography and Steganography
100

A security flaw, glitch, or weakness found in software code that could be exploited by an attacker.

What is a Vulnerability?

100

A tweak to the OS code that will fix an issue in how it runs or compatibility with devices and applications.

What is an update/patch?

100

A structured process through which we identify potential security threats and vulnerabilities.

What is Threat Modeling?

100

Individual ons and offs in a computer system.

What are bits?

100

Scrambling data so that it is unreadable to anyone except those who know the trick to decoding it.

What is Crytography?
200

 A specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access.

What is an exploit?

200

A fix for a bug that is affecting OS functionality.

What is a Critical fix?
200

Physical objects that are embedded with sensors, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or networks.

What is the Internet of Things (IoT)?

200

The system which represents alpha-numeric data in a computers, such as A = 65 = 01000001.

What is the ASCII Table?

200

Encrypted data.

What is Ciphertext?

300

A database of known vulnerabilities in all types of digital products.

What is the Common Vulnerabilities and Exposures (CVE) database?

300

This is best practice is to provide each user with the minimum system access needed to perform their necessary tasks.

What is the Least Privilege Principle?

300

Recommended actions we should take to secure devices like computers or smartphones.

What are best practices?

300

A base 16 number system.

What is hexadecimal?

300

A historic cipher in which the alphabet is shifted left or right a given number of spaces.

What is a Caesar Cipher?

400

To minimize the risk or lessen the force or intensity of something unpleasant.

What is to mitigate?

400

A backup that includes the operating system and configuration settings.

What is a System Image?

400

A special online tool that hackers use to scan the internet for open devices.

What is shodan?

400

Representing a range of characters by some kind of conversion system.

What is encoding?

400

A technique used to solve substitution ciphers based on commonly used letters and words.

What is Frequency Analysis?

500

These are important to install regularly.

What are updates?

500

A patch for a very specific issue ‐not released through automatic updates.

What is a Hotfix?
500

These should be changed when you obtain a new device, if possible.

What are the default username and password for the admin account?

500

01001001 as a hexadecimal number.

What is 49?

500

The information about a file that is embedded in the file, such as date, location, size, etc.

What is metadata?