Threats, Attacks, & Vulnerabilities
Identity, Access Management
Cryptography & PKI
Risk Management
Bonus
100

This is a wireless interference attack

Jamming

100

AAA stands for?

Authentication, Authorization, Accounting

100
This takes plain text and turns it into unreadable ciphertext 

Encryption

100

Ways to dispose of hard drive

Shredding, Pulverizing 

100

Port 49?

TACACS

200

This is a politically motivated attacker

Hacktivist
200

Blank uses updated sequence numbers and timestamps. It can prevent pass the hash and replay attacks

Kerberos

200

DES, 3 DES, AES, Twofish and Blowfish ^ what type of encryption?

Symmetric Encryption

200

Job Rotation Purpose ( Give 2 reasons)

Prevent single point of failure. To detect fraud and or theft.

200
Legal Agreement to not discuss company business/secrets

Non-Disclosure Agreement NDA

300

Upon gaining access from low level host, you are now able to use this same technique to launch an attack against a more critical point within the computer system or network. 

Pivoting 

300
Access Management based on file classification; for example a secret

MAC

300

Encrypts large amounts of data

Symmetric Encryption

300
After a investigation of an incident has been completed ___ would be used to prevent re-occurrence?

Lessons Learned

300
Virus, worm, trojan, randsomeware adware, spyware examples of?

Malware

400

Prevents SQL injection, buffer overflow, and integer overflow

Input Validation

400

A person gains access to a system because of biometric authentication error

False Acceptance Rate

400

Can be added to a stored password which adds extra security

Salt or key stretching (Bcrypt - PBKDF2)

400
Allows only one person to enter facility at a time

Mantrap

400

Implemented to prevent Certificate Authority (CA) compromise?

Certificate Pinning

500

printf ("\n Correct Password \n");
pass = 1;
}
if(pass)
{
/* Now Give root or admin rights to user*/
printf ("\n Root privileges given to the user \n");
}
return 0;

$ ./bfrovrflw 

Enter the password :
hhhhhhhhhhhhhhhhhhhh 

Wrong Password Root privileges given to the user

500

This alerts a apple security team when any product unintentionally leaves the facility (Apple Store)?

Geofencing

500

RIPEND, RIPEMD-128, and RIPEMD-160

Hashing Algorithm 

500

This alternative allows a company 3-4 hour turn around to be up and running 

Warm site

500

_____is a Microsoft AAA server that uses an Active Directory domain

controller to enforce access to the network

Radius