This animal that doubles as a way to print out ASCII contents of a file. Too bad it cannot display images, otherwise you'd see how cute I am!
cat
A ransomware attack that encrypted 3,800 City of Atlanta computers demanded 6 of these digital items to unfreeze them
Bitcoin
These attacks attempt to reel in the user with promises that are too good to be true
phishing
Smaller networks can be secured with the packet-filtering type of this protective program
a firewall
This encryption method was used by a Roman general for secret military communications
Caesar cipher
This command may make you feel super with all the power it grants
sudo
It's the government department that includes CISA, the official federal cybersecurity agency created in 2018
This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability
white-hat
They call me the phonebook of the internet for my name-to-number matching
DNS
This type of cipher encrypts plain text in fixed-size chunks
block cipher
The predecessor to this command isn't "Floppy Disk." In fact, this command has nothing to do with removable media!
cd
This computer worm infected over 10 million computers in 2000 by spreading via email featuring this provocative subject line
ILOVEYOU or Love Bug Loveletter
Beware of these types of programs that track every stroke you make while typing in an effort to glean your password
Keylogging programs
This attack occurs somewhere between you and the server when you don't use HTTPS.
man-in-the-middle
This encryption algorithm is super secure, BUT you can only use the key once!
one-time pad
This command can find the IP address of a web server given its domain name
nslookup
This 2017 cyberattack used the EternalBlue exploit to encrypt Windows users' files, demanding large cryptocurrency payments as a ransom
WannaCry
This attack floods servers with malicious requests, stopping legitimate users' requests. In the "Distributed" version of this attack, servers are flooded with requests from many sources
Denial of Service (DoS)
This web file keeps crawlers on the right path
robots.txt
The "R" in RSA, RC6, and author of the popular algorithms book CLRS
Rivest
A disk-checking command that sounds like a swear word
fsck
In a 1984 paper, this computer scientist is credited with coining the term "computer virus." They also happen to be the "A" in RSA
Leonard Adleman
It's literally porta sul retro, but Italian hackers use this English term
a backdoor
This was the the first public packet-switched computer network which was mainly used for academic and research.
ARPANET
This German-born's symmetric encryption scheme can be found utilized in DES, Blowfish, and Twofish
Feistel