The practice of protecting systems, networks, and programs from digital attacks
What is Cybersecurity?
A common debugger for the C/C++ Programming language. It is also commonly used in reverse engineering binary code.
What is GDB?
A green, glow-in the dark statue that has recently exploded in internet popularity
What is smiski?
The year that the College of Information and Computer Sciences was founded
What is 2012?
The UMass Mascot
Who is Sam the Minuteman?
A computer program that runs as a background process.
What is a daemon?
An ethical hacker
What is a white hat?
A cybersecurity course designed and previously taught by undergraduate students from UMass Cybersecurity Club.
What is 390-R?
A CICS Faculty member who joined in 2017 after nearly three decades of research at IBM
Who is Laura Haas?
A dinner special served at the UMass dining halls every Halloween
What is Lobster and Steak?
Potential computer errors related to the formatting and storage of calendar data for dates in and after the year 2000. Many programs represented four-digit years with only the final two digits, making the year 2000 indistinguishable from 1900.
What is the y2k bug?
An encryption method that uses one key to encrypt and another key to decrypt the input plaintext
What is asymmetric encryption?
The inventor of the merge sort algorithm
Who is John Von Neumann?
The number of CICS Academic Advisors
What is 15?
The year UMass was founded
What is 1863?
A computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs
What is ILOVEYOU?
An attack on a previously unknown system vulnerability
What is a zero day attack?
Light, delicate Chinese gelatin-based dessert favored by a certain green-haired polearm-wielding character.
What is almond tofu?
The course code that refers to "Logic in Computer Science"
What is COMPSCI 513?
A famous condiment founded at UMass
(hint: it goes on pizza)
What is Mike's Hot Honey?
Gamified competitions in which participants are challenged to find and exploit vulnerabilities in a system to capture a "flag" or piece of information.
What is a CTF?
The top 1 most common web vulnerability released by OWASP in 2021. This occurs when a web application fails to properly enforce restrictions on what authenticated users are allowed to do.
What is Broken Access Control?
A city in Germany that was embroiled in a satirical conspiracy theory that denied its existence
What is Bielefeld, Germany?
The research session in the Summer and Winter that allows undergrads to work under a PHD and host a poster session
What is URV?
What is the Physical Sciences Building?