Just the basics
InfoSec History
Encryption and Authentication
Cyber Attacks
CIA Triad
100

A piece of malicious software that can replicate itself and spread to other computers or devices.

What is a computer virus?

100

In 2020 this pandemic forced organizations to rapidly adopt remote work arrangements and digital technologies, leading to an expansion of the attack surface and increased cybersecurity risks. 

What is the COVID-19 pandemic?

100

This cryptographic technique is used to convert readable data into an unreadable format to ensure confidentiality.

What is encryption?

100

This type of malware is designed to encrypt files on a victim's computer and demand payment for their release.

What is ransomware?

100

These 3 core principals confidentially, integrity, and availability are the foundational concepts in information security essential for protecting assets is comprised of this framework.

What is the CIA Triad?

200

This cybersecurity framework, developed by the National Institute of Standards and Technology (NIST), provides a comprehensive set of guidelines and best practices for improving cybersecurity posture.

What is the NIST Cybersecurity Framework?

200

This project created by the Advanced Research Projects Agency, of the United States Department of Defense, started researching the feasibility of a networked system of communication to trade information within the United States Armed Forces in 1968. 

What is the ARPANET project?

200

This term refers to the process of converting ciphertext back into its original plaintext form.

What is decryption?

200

This type of attack involves flooding a network or server with an overwhelming amount of traffic to disrupt normal operation.

What is a Distributed Denial of Service (DDoS) attack?

200

This security principle ensures that information is only accessible to authorized users and not disclosed to unauthorized parties.

What is confidentiality?

300

This term describes the unauthorized access or use of computer systems or networks for malicious purposes.

What is hacking?

300

This man is credited with inventing the Ceasar cipher in 50 B.C.

Who is Julius Caesar?

300

This type of security control verifies the authenticity of a user's identity based on physical characteristics, such as a smart card or USB token.

What is possession-based authentication?

300

This type of attack involves tricking individuals into divulging sensitive information such as passwords or financial details.

What is phishing?

300

This term refers to the practice of ensuring that data is available and accessible to authorized users when needed.

What is data availability?

400

This principle of information security ensures that individuals are granted only the minimum level of access or permissions necessary to perform their job functions.

What is the principle of least privilege?

400

This machine was employed by the Germans in World War II to encrypt the data of warfare and was successfully decrypted by Alan Turing.

What is the Enigma Machine?

400

This authentication method verifies the identity of a user by analyzing unique physical characteristics, such as fingerprints or facial features.

What is biometric authentication?

400

This type of attack involves intercepting and altering communication between two parties without their knowledge.

What is a man-in-the-middle (MitM) attack?

400

This term refers to the process of identifying, assessing, and managing security risks to information systems.

What is risk management?

500

This type of security control prevents unauthorized access to a network by analyzing and monitoring incoming and outgoing traffic.

What is a firewall?

500

In 1988, this man infected thousands of computers worldwide and was one of the first major internet worm attacks.

Who is Morris Worm?

500

This protocol is used to establish secure communication over a computer network by encrypting data transmitted between two parties.

What is the Secure Sockets Layer (SSL) or Transport Layer Security (TLS)?

500

These attacks exploit human psychology and manipulate individuals into divulging sensitive information, performing actions, or bypassing security measures. Examples include pretexting, baiting, tailgating, and impersonation. 

What are social engineering attacks?

500

Donn B. Parker expands on the CIA Triad by adding three more items: authenticity, possession or control, and utility. These six principles in pairs: confidentiality and possession, integrity and authenticity, and availability and utility. These six principles have come to be called ____ ____.

What is the Parkerian Hexad?