Linux Commands
Cybersec History
Hacking
WWW.
Encryption
200

This animal that doubles as a way to print out ASCII contents of a file. Too bad it cannot display images, otherwise you'd see how cute I am!

cat

200

A ransomware attack that encrypted 3,800 City of Atlanta computers demanded 6 of these digital items to unfreeze them

Bitcoin

200

These attacks attempt to reel in the user with promises that are too good to be true

phishing

200

Smaller networks can be secured with the packet-filtering type of this protective program

a firewall

200

This encryption method was used by a Roman general for secret military communications

Caesar cipher

400

This command may make you feel super with all the power it grants

sudo

400

It's the government department that includes CISA, the official federal cybersecurity agency created in 2018

Dept. of Homeland Security
400

This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability

white-hat

400

They call me the phonebook of the internet for my name-to-number matching

DNS

400

This type of cipher encrypts plain text in fixed-size chunks

block cipher

600

The predecessor to this command isn't "Floppy Disk." In fact, this command has nothing to do with removable media!

cd

600

This computer worm infected over 10 million computers in 2000 by spreading via email featuring this provocative subject line

ILOVEYOU or Love Bug Loveletter

600

Beware of these types of programs that track every stroke you make while typing in an effort to glean your password

Keylogging programs

600

This attack occurs somewhere between you and the server when you don't use HTTPS.

man-in-the-middle

600

This encryption algorithm is super secure, BUT you can only use the key once!

one-time pad

800

This command can find the IP address of a web server given its domain name

nslookup

800

This 2017 cyberattack used the EternalBlue exploit to encrypt Windows users' files, demanding large cryptocurrency payments as a ransom

WannaCry

800

This attack floods servers with malicious requests, stopping legitimate users' requests. In the "Distributed" version of this attack, servers are flooded with requests from many sources

Denial of Service (DoS)

800

This web file keeps crawlers on the right path

robots.txt

800

The "R" in RSA, RC6, and author of the popular algorithms book CLRS

Rivest

1000

A disk-checking command that sounds like a swear word

fsck

1000

In a 1984 paper, this computer scientist is credited with coining the term "computer virus." They also happen to be the "A" in RSA

Leonard Adleman

1000

It's literally porta sul retro, but Italian hackers use this English term

a backdoor

1000

This was the the first public packet-switched computer network which was mainly used for academic and research.

ARPANET

1000

This German-born's symmetric encryption scheme can be found utilized in DES, Blowfish, and Twofish

Feistel

M
e
n
u