Also called a “jump box” or “jump server,” what kind of host is used to manage remote access to a private network from an external one (e.g., for authorized users connecting through the Internet)
What is Bastion?
Besides being an actual witch, this "Buffy the Vampire Slayer" character played by Alyson Hannigan was also a skilled computer hacker
Who is Willow?
According to an analysis by the UK's National Cyber Security Centre that investigated passwords belonging to hacked accounts worldwide, the most common six-letter "word" that is used for passwords that don't require numbers or punctuation
What is Qwerty?
An exploit payload is sometimes called by what other name that makes it sound like something a beach-bum hacker would spot on the sand
What is shellcode?
A two-word term is given to malicious or misleading data from a remote name server is saved by another name server
What is cache poisoning?
This University initially maintained the text file named HOSTS.TXT that mapped host names to the numerical addresses of computers on the ARPANET
What is Stanford?
With the first name Peter, this programmer released a series of computer utilities in 1982, which included Unerase, a utility to find deleted files? His name is well known in anti-virus software
Who is Norton?
This technology ensures that email messages are signed with a digital signature to verify the sender's identity and ensure the message's integrity.
What is DomainKeys Identified Mail aka DKIM?
An automated software testing method that injects invalid, malformed, or unexpected inputs into a system to reveal software defects and vulnerabilities
What is fuzzer?
Term is given to a malicious technique by which a victim is tricked into clicking on a URL, button or other screen object other than that intended by or perceived by the user
What is clickjacking?
The two-word ursine name of the Russian cyber espionage group, also known as APT28, thought to be operating since the 2000s
What is Fancy Bear?
Google’s reCAPTCHA protects websites from getting spammed by making users complete a visual task. It’s an example of which famous test to tell humans from machines
What is the Turing test?
This protocol is widely used for secure, federated identity management, allowing users to authenticate with one system and gain access to others without re-entering credentials
What is SAML?
This term is used to describe the “cargo” that malware brings with it when it infects a device?
What is payload?
This type of “poisoning” technique involves hackers inserting malicious links into websites that are engineered to rank high on Google, thereby tricking people into clicking them when they search for something
What is SEO?
This cybersecurity architecture / model states that a network is always at risk from outside and inside threats, that every user should be verified every time, and that users should only have as much access as they need
What is ZeroTrust?
This 2016 attack exposed the personal information of over 500 million users of this Internet company
What is Yahoo?
This authentication protocol allows users to securely access multiple applications or services using a single set of credentials, often through integration with identity providers.
What is SSO?
Use of a valid session key to gain unauthorized access for the information or services residing on a computer system
What is session hijacking?
You might recognize this type of attack if you are a fan of Discovery or National Geographic channels , inserting malware into a frequently visited site.
What is a watering hole attack?
This infamous hacking group was responsible for a series of high-profile attacks, including the 2014 Sony Pictures hack
Who is the Lazarus Group?
This former NSA contractor leaked classified documents revealing extensive government surveillance programs to the media in 2013
Who is Snowden?
Why did the scarecrow become a cybersecurity expert?
Because he was outstanding in his field!
This term describes DNS queries and responses used to bypass traditional security measures
What is DNS tunneling?
An all-out cyberwarfare attack that performs a three-stage systematic attack on a nation's computer infrastructure. It is called this because "Everything must go"
What is a fire sale?