Defense against dark arts: Multidisciplinary security quiz

Do you know enough arcane vocabulary to impress your party guests?

1. Barbican

a. Exterior walled passage at a castle entrance that forces intruders into a narrow space

b. Development project name for software on the first DEC VAX

c. Australian for "grill"

2. Blowback

a. Erroneous results from a ping that flood and disable the inquiring computer

b. Misinformation planted by spies from country A to mislead country B, that then filters back and misleads the government of country A

c. Clues in legitimate tax returns that lead to discovery of fraud

3. Chad Box

a. A variation on Nigerian or 411 scams

b. Non-shredding discard box for visitor badges

c. Receptacle for debris from '70s data-processing punchcards

4. Cobbler

a. Espionage agent who creates false documents

b. Infosec defender with capabilities equal to a script kiddie

c. Tasty dessert that makes fruit unhealthy to eat

5. Dry Cleaning

a. Vacuuming dust out of an old computer chassis

b. Methods used by a spy to figure out if he or she is being watched

c. Washing illicit funds through a series of businesses to confuse the audit trail

6. Innocent Postcard

a. Email to sysadmins attempting to explain porn surfing was "accidental"

b. High-volume, low-content email sent to slow down any subsequent e-discovery efforts

c. Meaningless message sent to an address in a neutral country, verifying that a covert operative is still safe

7. Kapelle

a. Top secret communications security device used by the KGB; operators were called pianists

b. A gable atop castle ramparts intended to deflect projectiles

c. '90s boy band with limited commercial success

8. Layering

a. Including slightly different misinformation in each of several versions of a story told to multiple mistrusted people

b. Washing illicit funds through a series of businesses to confuse the audit trail

c. Serving multiple types of cobbler in the same dish

9. Murder Hole

a. A small opening in the chad box

b. An apparently minor misconfiguration

c. A hole in a passage wall or ceiling that castle defenders used to shoot arrows at invaders

10. Starburst Maneuver

a. Cars in a convoy suddenly go in different directions to identify or shake anyone tailing them

b. Any very simple hacking technique (as in "candy from a baby")

c. Washing illicit funds through a series of businesses to confuse the audit trail













0-4 points: Try to read more often

5-7 points: Well done

8-10 points: Try to get outside more often


Join the CSO newsletter!

Error: Please check your email address.

Tags security

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Derek Slater

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts