This is the most common method hackers use to trick users into giving up passwords?
What is Phishing?
These professionals simulate cyberattacks to find system vulnerabilities.
Who are penetration testers/ethical hackers?
Name 3 Types of Phishing
What is....Email phishing, Spear phishing, Whaling, Clone phishing, Angler phishing, Vishing, Smishing, Pharming, Business Email Compromise (BEC), QR code phishing (QRishing), Watering hole attacks, Pop-up phishing, Search-engine phishing, OAuth phishing, Man-in-the-middle phishing, Domain spoofing, Homograph attack, Deepfake phishing, Evil Twin Wi-Fi phishing, Attachment-based phishing...etc
What does WiCyS stand for?
Thats too Easy! What is the CIA Triad?
This month is officially recognized as Cybersecurity Awareness Month.
What is... October?
This process turns readable data into scrambled code to protect it from unauthorized access.
What is encryption?
This entry-level IT role often serves as the first point of contact for users experiencing technical issues.
What is a Help Desk Technician?
Name 3 Cybersecurity certification Vendors
What is...CompTIA, (ISC)², ISACA, EC-Council, Offensive Security, GIAC (SANS Institute), Cisco, Microsoft, Google, AWS, IBM, Palo Alto Networks, Fortinet, Red Hat, CREST etc...
This 3 letter acronym hides your online identity by encrypting your internet traffic through a discrete server.
What is a VPN? (Virtual Private Network)
Free if you Brought a Friend!
Didn't bring a friend? Free if you follow WiCyS FIU on at least 2 social media platforms!
Regularly updating this helps patch known vulnerabilities.
What is your operating system or software?
These analysts monitor systems and respond to cybersecurity incidents in real time.
Who are SOC Analysts?
Name 3 commonly used Cybersecurity tools
What is...Wireshark, Nmap, Metasploit, Nessus, Burp Suite, Snort, Splunk, Suricata, Kali Linux, OpenVAS, OSSEC, Aircrack-ng, Autopsy, Nikto, John the Ripper etc...
This stands for the unique identifier assigned to every device on a network.
What is IP (Internet Protocol)?
Name 2 WiCyS FIU Eboard Members!
Who is....
This layer of security monitors and controls incoming and outgoing network traffic based on predetermined rules.
What is a firewall?
This professional designs and builds secure systems and networks to protect organizational assets.
Who is a Security Engineer?
Name 3 Linux Commands and their functions.
What is...ls, cd, pwd, mkdir, rm, rmdir, cp, mv, touch, cat, nano, vi, chmod, chown, ps, top, kill, grep, find, df etc...
This term refers to information collected from publicly available sources like websites and social media.
What is Open-Source Intelligence (OSINT)?
When was WiCyS National founded?
What is 2013?
This type of attack floods a network with excessive traffic, causing it to slow or crash.
What is a DDoS (Distributed Denial of Service) attack?
This cybersecurity leader manages teams, policies, and strategy to protect an organization’s information systems.
Who is a Chief Information Security Officer (CISO)?
Name 3 Cybersecurity Frameworks.
What is...NIST Cybersecurity Framework (CSF), ISO/IEC 27001, CIS Controls, COBIT, NIST SP 800-53, NIST Risk Management Framework (RMF), PCI DSS, SOC 2, HITRUST CSF, GDPR Framework, MITRE ATT&CK, FAIR Framework, NERC CIP, HIPAA Security Rule, ITIL Security Management, PCI-DSS etc....
This common encryption protocol secures data between browsers and websites.
What is TLS (Transport Layer Security)?
Free if you've been to at least 2 of our events this semester!
Havent attended? RSVP for our Intro to Cyberpolicy & Governance Seminar next week!