Programming
Identify two programming languages you will be using with Raspberry Pi 400.
What are Scratch 3 & Python?
Another name for Caesar Cipher
What is a Shift Cipher?
The practice of protection of internet-connected systems such as hardware, software and data from cyberattacks.
What is Cybersecurity?
A virtual computer running inside a physical computer.
What is a Virtual Machine?
Identify three pillars of personal cybersecurity.
What types of pillars are data protection, device security, & online privacy?
Name the operating system Raspberry Pi is operating with.
What is Linux Debian?
The inverse of encryption.
What is Decryption?
An example of analogy of cybersecurity
What is home security?
Name a Linux-based penetration testing platform that provides a broad array of testing tools and includes over 300 tools by default.
What is Kali Linux?
Identify two things you can do to improve device security related to apps.
What are downloading from legitimate sources & removing any apps you no longer use/need used for?
This is the writing instructions for a computer to perform desired actions.
What is Programming?
An average number of attempts in breaking a cipher text of an English message using Caesar Cipher.
What are 13 attempts?
Something of value that is stored digitally.
What is Digital Asset?
Name at least two command lines to obtain the IPv4 address from a Linux operating system.
What is ip a, ip address and/or ifconfig?
Identify two types of backups.
What are Local Physical Storage and Cloud Storage?
Identify two uses of programming.
How are Mobile Apps, Video Games, Data Analytics, Websites & Software being built?
Name the usual technique for cracking a substitution cipher.
What is Frequency Analysis?
Identify three examples of devices that store digital assets.
What are mobile phones, computers, IoT devices, cars, credit/debit card and/or WiFi routers?
Identify two Hypervisors that you can install free of charge on your home machine for non-commercial purposes.
What are VMware Player and Oracle VirtualBox?
Explain how bookmark a site you visit often is a good security practice.
What type of good security practice is when you get an email you think is phishing and may have fake links, do not click on the links and use the bookmark links to go directly to the correct website so you know you are logging into the right site?
Identify two reasons why programming is important in the Cybersecurity field.
How to read & interpret the code to detect the weak areas for malicious activities, writing code to improve security and/or enhance logical and analytical skills important in Cybersecurity field?
A word is encrypted using Caesar Cipher as BZIQV. The third letter of that word is 'A'. The decrypted word is______ using a shift of _____.
What is the encryption of TRAIN in Caesar Cipher using a shift of 8?
Identify three examples of Digital Assets.
What are bank account, digital wallet, social media, website logins, medical information, email, text and/or apps?
Identify the malicious hacker's ultimate goal when exploiting vulnerabilities?
Whose ultimate goal is to gain unauthorized access to computers, networks, and files?
Identify a way of how to improve security at home with network devices that do not receive frequent updates like Smart TVs, security cameras and/or gaming consoles.
Why should you place them on a separate guest wifi network, not the main wifi network used by home computers, laptops or phones?