A step-by-step process used to solve a problem
What is an algorithm
Malicious software designed to harm systems
What is Malware
A hacker who works ethically to improve security
What is a White Hat
A system that filters incoming/outgoing traffic
What is a firewall
Famous hacker conference in Las Vegas
What is DEF CON
The three core principles of cybersecurity?
CIA Triad or Confidentiality, Encryption, Availability
A program that records keystrokes
What is a key logger
Fake emails used to steal personal information
What is phishing
A tool used to scan networks for vulnerabilities
What is NMAP
WWII encryption device used by Germany
What is the Enigma Machine
What is the C in the CIA Triad
Confidentiality
Malware disguised as legitimate software
What is a worm
Overloading a system to shut it down
What is a denial of service attack
Command used to trace a packet's route
What is Tracert
Famous cyberattack involving US and China tensions
What is the Hainan Island Incident
Turning data into secret code is
What is Encryption
Self-replicating malware that spreads across networks
What is a worm
Intercepting communication between two parties
What is a Man-in-the-Middle Attack
A fake system used to trap hackers
What is a honeypot
Art sculpture containing encrypted messages
What is the Kryptos Sculpture
Ensuring systems are accessible when needed
What is availability
A hidden program that gives unauthorized access
What is a Rootkit
A beginner hacker using pre-made tools
What is a Script Kiddie
A protocol used to send emails
What is SMTP
One of the earliest large-scale cyber espionage attacks
What is Moonlight Maze