This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Security Infiltration

Choose the correct answers to infiltrate the cybercity

CHENGYUNQUAN
Created Date 09.02.21
Last Updated 09.03.21
Viewed 2 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit
0

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • As an antagonist, you will craft a of malware to attack a cyber fort, the cyber fort has a few defenses.
  • What is a malware?
  • Your Malware is payload based what does that mean?
  • Before launching a malware attack, let's craft a countermeasure. How?
  • You found a virus in your system, it classifies as a polymorphic virus, can you identify it?
  • Security administration requires physical security, what does it mean?
  • While you were focused on the attack, your adversary sent spies against you! Now the spies are fiddling with your main operation systems, with what you have learnt in OS security, repel their attack!
  • To protect your data from being stolen, what you should protect?
  • To make sure only you can access your data, what type of user auth method is best?
  • How to harden your operating system?
  • You will require a reference monitor for your security maintenance, what is a reference monitor?
  • There is a similar reference monitor used in your system by windows, do you know its name?
  • To not let the spies, repeat a similar attack, you must secure your database and launch a network attack on your adversary with SQL Detection and countermeasures.
  • Comparing database and OS security requirements, which are the differences?
  • SQL injection attack is?
  • For SQLi Countermeasures, what are they?
  • SQLi Detection is one of the countermeasures, what are they?
  • What kind of network security implementations can be used?

User comments are currently unavailable. We apologize for the inconvenience and are working to restore this feature as soon as possible.