The main mechanic that identifies a user within a system.
What is Authentication?
A place where websites can store local data on a clients machine.
What are Cookies?
An online technique where a person poses as another in order to gain their confidence and eventually coerce them into giving up secrets.
What is a phishing attack?
A humorous image that is copied (often with slight variations) and spread rapidly by Internet users.
What is a meme?
The main mechanic that determines if a user can access specific data or functionality.
What is Authorization?
A stateful data storage that could be either client-side or server-side, typically you will see a little of me in both places.
What is Session?
A browser attack where data is POST'ed from outside the actual web application, typically from another site.
What is a Cross-Site Scripting Attack?
Professional football organization who have won the most super bowls since 1967 (Super Bowl I.)
A resource to which a system regulates access for.
What is a Securable?
JSON-based, compact, and signed message format for sharing credential information across systems.
What are JavaScript Web Tokens?
An attack where an application can have arbitrary database-level code executed.
What is SQL Injection?
Launched in 1962 it is a popular collection of kid stories that focus on a family of bears learning and teaching life lessons.
What is the Berenstain Bears?
An entity that receives permission to a access a resource.
What is a Principle?
One-way cryptographic function that can be used to map data of arbitrary size to data of a fixed size.
What is a hashing algorithm?
Psychological manipulation of people into performing actions or divulging confidential information.
What is social engineering?
The organization responsible for the creation of the SHA-256 algorithm.
The information security model which ensure data is private, correct, and accessible.
What is the CIA Model?
Sprinkle some on a cryptographic function to make sure no two digests are ever the same.
What is salt?
Technique used to alter MAC and IP addresses of a network in order to manipulate routing paths, generally used to launch man-in-the-middle attacks.
What is ARP poisoning?
Year when the first website was launched on the World Wide Web.
What is 1991?