The set of laws for use of cybersecurity
What are the Ten Commandments
the process of inputting a computer inside another computer to use the inputted computer's software, it comes without a large risk of messing with the main frame of your host also.
What is virtualization
the terminal being put into use for coding and commands
Command line interface
Confidentiality Integrity, availability
What are the three acronyms for CIA
Do not interfere with others work.
What is the second commandment
Enhanced security, low cost, disaster percentage lowered and able to fix if something goes wrong.
what are the benefits of using
cd ~
what is the command to go home
Authentication, access control, accounting
what are the three A's of AAA
do not snoop in others files
what is the 3rd commandment
Windows 7 or kali linux
What is one OS you can use
cd
what does change directory
Do not use your computer to steal
what is commandment 4
salting
Putting extra numbers on a password to protect from hackers
bearing false witness using your computer.
what is the 5th commandment
the code that moves something in your files.
what does the code mv do.