UNIT 1 CODEHS
CYBERSECURITY
COPYRIGHT
PRIVACY & SECURITY
HACKING ETHICS
100

I am Confidentiality, Integrity, and Availability. 

The CIA Triad
100

I am the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data. 

What is the Internet of Things?

100

A law that grants the creator of an original work exclusive rights to its use, distribution, and sale

What is Copyright?
100

how company’s use your data

What is Data Privacy?

100


attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons

What is black hat hacking?

200


I am The assurance that systems and data are accessible by authorized users when and where needed.

What is Availability?

200

I am the Protection of computer systems, networks, and data from digital attacks 

What is Cybersecurity?

200


Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.

What is a public domain?

200


protecting your data online

What is data security?

200

a computer security specialist who breaks into protected systems and networks to test and assess their security

What is white hat hacking?

300

Aims at ensuring that information is protected from unauthorized or unintentional alteration.

What is Integrity?
300

 is a type cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.

What is Ransomware?

300

 laws protect the creator so that no one else can use the work as their own. The original creator must get the credit.

What are copyright laws?

300

I secure data transfer protocol when on the internet

HTPPS

300

someone who seeks to break through defenses and exploit weaknesses in a computer system or network.

What is a Hacker?

400

I am The protection of information from people who are not authorized to view it.

Confidentiality 

400


Identity theft, stealing money, stealing private information, controlling private computers.

What is Cyber crime?

400

Cite all sources to ensure that the original creator receives credit for the work.

What is it to protect creators rights?

400


Legal document outlining how a company can collect and use your data

What is privacy policy?

400

Yes or No? Hackers may be allowed to attempt to hack into a system to discover vulnerabilities that can then be fixed.

Yes

500

Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.

What is internet safety?
500

Relating to computers or computer networks

What is Cyber?

500

All rights reserved, Some rights reserved, and public domain

What are some examples of Copyright Licenses?

500

 typically longer in length, contain a combination of lower case letter, upper case letter, special characters, punctuation, and numbers

What are complex passwords?

500

 a person can face felony charges including prison time and high fines.

What is hacking illegally? 

M
e
n
u