"Cyber" What!
Breaking In!
Shhh...It's A Secret!
Concepts
Potpourri
100

The best camp to learn about cybersecurity and cyber safety

Gencyber @PGCC

100

12+ characters, special characters, letters, and numbers

Secure Password

100
A human effort to trick an individual into giving secret or private information

Social Engineering

100

The strategy of designing information and securing systems to be configured and operated as simple as possible

Keep It Simple

100

A hidden message

Code

200

The moral principle that governs a person's behavior in an online environment

Cyber Ethics

200

Malware that locks up user's files and demands a fee to unlock them

Ransomware

200

Receiving an email from JoeBanker@WhalesFargo.com informing you that he needs your login credentials is an example of...

Phishing

200

Ensuring a specific system/resource has not been modified or destroyed without authorization

Integrity

200

A person who, with permission, breaks into a network without malicious intent

White Hat Hacker or Ethical Hacker

300

The state of being protected against criminal or unauthorized access of electronic data, or measures taken to achieve this

Cybersecurity

300

Someone who breaks into a network maliciously or for personal gain without authorization - can be federally prosecuted by legal authorities.

Black Hat Hacker

300

A software or hardware designed to block unauthorized access while allowing outward communication.

Firewall

300

Putting yourself in the mindset of someone who may potentially attack your system in order to adequately defend yourself

Think Like An Adversary

300

This Linux command prints out the contents of a file.

cat

400

 Creating an Instagram account for the worst dressed students in school could be an example of


Cyberbullying

400

Malware that downloads onto a computer disguised as a legitimate program.

Trojan Horse

400

I received a text message asking me to call Bank of America. I don't even own a bank account there... This is an example of...

Smishing 

400

Multiple layers of security for a system. If one layer fails, another system is in place.

Defense in Depth

400

A field of cybersecurity that uses investigative techniques to identify and store evidence from a computer.

Digital Forensics

500

This profession plans and carries out security measures to protect a company's computer networks and systems.

Cybersecurity Analyst

500

A program that blocks malware

Anti Virus

500

Phishing scams targeting people holding high positions in an organization or business

Whaling

500

This principle is concerned with only allowing authorized individuals to have access to a system or resources

Confidentiality

500

A piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encrypt or decrypt cryptographic data.

Key

M
e
n
u