Demands money for 'unlocking' data
What is ransomware?
An attack on the availability of data
What is DOS/DDOS
Monitors packets coming into and out of a network
What is a firewall?
Requires at least two forms of authentication
What is multi-factor authentication?
Publishes year's top 10 web app vulnerabilities
What is OWASP?
A type of malware that self-propagates
What is a worm?
Installed by malware, it allows unauthenticated access to a system
What is a backdoor?
Ensures packets get delivered to the correct address on the Internet or on a LAN
What is a router?
Access that is based on a user's function(s) in the organization
What is role based access control (RBAC)?
A central storage point for developers to place all their source code
What is a code repository?
Malware that does not initiate until a specified trigger occurs
What is a logic bomb?
Focus on exploiting one or more specific targets using advanced attack skills
What are APTs?
A connectionless “best-effort” communications protocol
What is UDP?
the user name or account that by default has access to all commands and files on a Linux or other Unix-like OS
What is [root/root user]?
Name for code that does not contain good notes
What is 'spaghetti code'?
Computers are typically joined to this after being infected with malware
What is a botnet?
Type of attack that captures packets with intent of analyzing them
What is a sniffing attack?
OSI layer that transfers data between adjacent network nodes in a WAN or between nodes on the same LAN segment
What is OSI Layer 2, the data link layer?
A small room with two doors, each requiring a form of authentication to enter
What is a mantrap?
Allows applications to run in an isolated virtual environment for purposes such as testing
What is sandboxing?
The first worm ever to be released in the wild
What is the Morris worm
Acts as a countermeasure to replay attacks
What is a [timestamp/sequence number]?
A standard for radio communications between devices in closer proximity than RFID technology
What is near-field communication (NFC)?
A second piece to the credential set, with user name being the first piece
What is an authenticator?
The best prevention for buffer overflow attacks
What is input/parameter checking?