This encryption method uses the same key for both encryption and decryption.
What is symmetric encryption?
The tiny objects that make up an image and that are modified when hiding a text or image inside an image are called this:
What are pixels?
When you sign into a website using your password and are then prompted to enter a code you received on your mobile phone to continue, this is known as:
What is two-factor authentication?
The S in https stands for this:
What is Secure?
Atlanta was not always the capital of Georgia - it was actually this city.
What is Savannah?
This process scrambles data so only authorized parties can understand it.
What is encryption?
In addition to pictures and text that may be hidden within an image, this type of file may also be hidden in plain sight.
What is an audio file?
the regulation and management of environmental factors like temperature, humidity, air quality, and light, aiming to maintain a specific or desirable environment for various purposes
What are environmental controls?
A type of cyber attack, via email, aims to deceive users into providing sensitive information.
What is phishing?
The largest state east of the Mississippi river.
What is Georgia?
A strong password should be at least 8 to 12 characters long and include a mix of letters, numbers, and symbols. These are the type of requirements.
What are complexity requirements?
Unlike encryption, which scrambles a message to make it unreadable, steganography does this to a message.
What is concealing it (hiding it within another medium)?
This is something you have, something you are, and something you know.
attackers encrypt data and demand payment for its release, cause significant financial and operational disruption.
What is ransomware?
The country with the largest number of lakes in the world.
What is Canada?
In order to decrypt cipher text there is something you must have or know to crack the code. This is referred to as the:
What is the key?
Pictures with hidden images, like the ones we looked at in CodeHS, are often called:
Magic Eye Pictures/Images
the automated recognition of individuals by means of unique physical characteristics, typically for the purposes of security.
What is biometrics?
95% of breaches attributed to it every year.
What is human error?
This team won the 2024 NBA Championship.
Who are the Boston Celtics?
When you are trying to decrypt a message sometimes you notice patterns or repeating letters. This is referred to as:
What is frequency analysis?
In digital steganography, this type of file is commonly used to conceal hidden messages due to its ability to store redundant data without noticeable quality loss.
What is an image file (e.g., PNG, BMP, or JPEG)?
Some workplaces and schools/universities do not provide devices such as cell phones, printers, and even computers. In those scenarios, users must provide their own technology. This is known as:
What is BYOD? (what does this stand for?)
The CIA triad stands for this:
What is confidentiality, integrity, and availability?
The largest mammal in the world.
What is the blue whale?