Cryptography
Threats
More threats :)
Safety measures
Misc
100
BDES, IDEA, AES are all examples of this kind of algorithm.
What is symmetric encryption / private key cryptography?
100
Malicious code that replicates by independently exploiting vulnerabilities in networks.
What is a worm?
100
Malware that fakes messages from the operating system or an antivirus, hoping to scare the user into downloading further malware.
What is scareware?
100
Modification to existing software, typically used to address security issues or bugs.
What is a patch?
100
Tactics by which a malicious individual can physically access a premise they are not authorized to, due to the carelessness of authorized individuals
What is tailgating / piggybacking?
200
Encryption strategy where the key used to encrypt is different from the key used to decrypt.
What is assymetric / public-key encryption?
200
Malicious program that uses a trigger to awaken the malicious code.
What is a logic bomb?
200
Vishing, Smishing, Pharming, and Whaling are all examples of this overall strategy.
What is phishing?
200
The really cool strategy of hiding information in a different media, such as embedding data in an image or audio file.
What is steganography?
200
Plug in that powers many interactive websites, known to be extremely vulnerable.
What is Adobe's flash?
300
Process by which users are notified that a key is no longer valid.
What is key revocation?
300
DOS strategy that relies on sending junk data to a server in the hopes it will crash.
What are maliciously formatted packets?
300
Strategy to push a malicious website up the search results of given search engine.
What is search engine optimization poisoning ?
300
Process by which an application's code is modified in order to make it harder for competitors or attackers to analyze
What is software obfuscation?
300
Latest fad.. I mean latest ransomware to hit at a global scale.
What is Petya?
400
type of cryptographic algorithms that are applied to a continuous sequence of data, of unknown length
What is a stream cypher?
400
Attack strategy when the attacker sends previously captured packets to a server.
What is a replay attack?
400
Situation where the attacker can reliably intercept packets sent between a target and a server.
What is a man in the middle attack?
400
Internet protocol that is a more secure version of IP. It enables the creation of VPNs
What is IPSEC?
400
Memory areas allocated to an application, they can sometimes be exploited to access other parts of memory.
What is a buffer?
500
Difficult mathematical operation that powers RSA, the most popular public key encryption.
What is factoring multiples of primes?
500
Denial of service attack on wireless devices, aiming not at any device, but at the wireless network itself.
What is RF Jamming?
500
Attack type that injects client-side scripts into web pages viewed by other users. Enabling the attacker to execute code on other clients when they access the page.
What is XSS / Cross site scripting?
500
More secure alternatives to the vulnerable Wired Equivalent Privacy security protocol.
What are WPA and WPA2?
500
Open source utility used to audit a network, checking available hosts, services, and firewalls
What is NMAP?