- ensure that information is hidden from people unauthorised to access it.
- modifies other legitimate host files in such a way that when you execute a file in the victim’s system, you also execute the virus.
- helps hackers spy on systems and their users.
- self-replicating and spreads without end-user action, causing real devastation.
- ensuring that data has not been tampered with and, therefore, can be trusted.
- are attempts to expose users to unwanted, potentially malicious advertising.
- malicious instructions that appear as legitimate programs.
- refers to the security of a computer or computer system
- authentication mechanisms, access channels and systems all have to work properly
- demands a ransom from you to get things back on track.
- result in financial and reputational damage, requiring unplanned and often significant expenditure to recover.

- Flag template is RevoCup2025{sumX}
- sumX is ASCII sum of all answers of the questions except 2, 9, 11 questions