Fundamentals & CIA
Physical & Device Security
Network Defense
The Dark Side (Attacks)
Acronyms & Definitions
100

This pillar of the CIA triad ensures that data is only accessible to authorized users.

What is Confidentiality?

100

These are the three primary categories of authentication factors: Knowledge, Possession, and what?

What is Inherence (Something you are)?

100

This "wall" of software or hardware sits between a private network and the internet to filter traffic.

What is a Firewall?

100

This type of attack overwhelms a system with traffic from multiple sources to take it offline.

What is DDoS (Distributed Denial-of-Service)?

100

This 3-letter acronym stands for the three fundamental pillars of info security.

What is CIA (Confidentiality, Integrity, Availability)?

200

This state of information refers to data being sent across a network.

What is Transmission?

200

This type of encryption, often abbreviated as FDE, protects all data on a device’s storage if it's lost or stolen.

What is FDE (Full Disk Encryption)?

200

This protocol automatically assigns IP addresses to devices on a network.

What is DHCP (Dynamic Host Configuration Protocol)?

200

 In this attack, a hacker secretly intercepts and alters communication between two parties.

What is MiTM (Man-in-the-Middle) Attack?

200

This acronym refers to a hardware identifier that is unique to every network device.

What is MAC (Media Access Control) address?

300

This is the "brain" of the computer that performs calculations and runs instructions.

What is the CPU (Central Processing Unit)?

300

This modern replacement for BIOS provides more features and better security during the boot process.

What is UEFI (Unified Extensible Firmware Interface)?

300

This security tool monitors for suspicious activity and sends alerts but doesn't necessarily block it.

What is IDS (Intrusion Detection System)?

300

This specific attack involves inserting malicious code into input fields to manipulate a database.

What is SQLi (SQL Injection )?

300

This 3-letter acronym represents the language used to manage and manipulate relational databases

What is SQL (Structured Query Language)?

400

Information is categorized into three states: stored, transmission, and this third state.

What is Processing?

400

This type of hacker is considered "ethical" and uses their skills for defensive purposes.

What is White Hat?

400

 This standard technology establishes an encrypted link between a web server and a browser.

What is TLS (Transport Layer Security)?

400

This term describes a long-term, targeted attack that remains undetected while stealing data.

What is APT (Advanced Persistent Threat) ?

400

This acronym describes a centralized unit responsible for monitoring and defending an organization.

What is SOC (Security Operation Center)?

500

These two types of number systems are commonly used to represent computer information.

What is Binary & Hexadecimal (or Decimal)?

500

This specific virus was mentioned in Unit 5 as a research topic regarding application vulnerabilities.

What is KadNap?

500

This 32-bit address is divided into a network segment and a host segment by a subnet mask.

What is IPV4?

500

These two real-life attacks (starting with S and D) use cyber tools to target individuals physically.

What is Swatting and Doxing?

500

This term refers to the amount of heat a CPU or GPU is expected to produce under load.

What is TDP (Thermal Design Power)?