Vulnerabilities
Security 101
Hacking
100
This vulnerability is listed as #1 on OWASP Top 10 web application vulnerabilities
What is Injection
100
The technology that makes identity, credentials, authentication and authorization secure.
What is Cryptography
100
This type of hacker violates computer security for little reason beyond maliciousness or for personal gain
What is Black Hat
200
This Firefox plugin – not as innocent as the farm animal its named after – makes stealing of web sessions over Wifi a breeze.
What is Firesheep
200
A hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application.
What is vulnerability
200
A form of social engineering, characterized by attempts to fraudulently acquire sensitive information by posting as a trustworthy person or business in an apparently official electronic communication
What is phishing
300
The best option to safely connect into public unprotected Wifi networks
What is VPN
300
Two-factor authentication typically is a signing-on process where a person proves his or her identity with two of the three methods: "something you know", "something you have" , or ---.
What is Something you are
300
A popular data-encoding scheme that enables binary-encoded data to be converted to printable ASCII characters and is often used by hackers
What is Base 64
400
This malicious exploit, also known as a one-click attack or session riding allows unauthorized commands transmitted to a website from a user that the website trusts.
What is CSRF/XSRF (Cross-site request forgery)?
400
This principle requires that every module (such as a process, a user or a program) must be able to access only such information and resources that are necessary for its legitimate purpose.
What is principle of least privilege
400
A common method for guessing login credentials and hacking via an application front door
What is Brute Force