The best camp to learn about cybersecurity and cyber safety
Gencyber @PGCC
12+ characters, special characters, letters, and numbers
Secure Password
Social Engineering
The strategy of designing information and securing systems to be configured and operated as simple as possible
Keep It Simple
A hidden message
Code
The moral principle that governs a person's behavior in an online environment
Cyber Ethics
Malware that locks up user's files and demands a fee to unlock them
Ransomware
Receiving an email from JoeBanker@WhalesFargo.com informing you that he needs your login credentials is an example of...
Phishing
Ensuring a specific system/resource has not been modified or destroyed without authorization
Integrity
A person who, with permission, breaks into a network without malicious intent
White Hat Hacker or Ethical Hacker
The state of being protected against criminal or unauthorized access of electronic data, or measures taken to achieve this
Cybersecurity
Someone who breaks into a network maliciously or for personal gain without authorization - can be federally prosecuted by legal authorities.
Black Hat Hacker
A software or hardware designed to block unauthorized access while allowing outward communication.
Firewall
Putting yourself in the mindset of someone who may potentially attack your system in order to adequately defend yourself
Think Like An Adversary
This Linux command prints out the contents of a file.
cat
Creating an Instagram account for the worst dressed students in school could be an example of
Cyberbullying
Malware that downloads onto a computer disguised as a legitimate program.
Trojan Horse
I received a text message asking me to call Bank of America. I don't even own a bank account there... This is an example of...
Smishing
Multiple layers of security for a system. If one layer fails, another system is in place.
Defense in Depth
A field of cybersecurity that uses investigative techniques to identify and store evidence from a computer.
Digital Forensics
This profession plans and carries out security measures to protect a company's computer networks and systems.
Cybersecurity Analyst
A program that blocks malware
Anti Virus
Phishing scams targeting people holding high positions in an organization or business
Whaling
This principle is concerned with only allowing authorized individuals to have access to a system or resources
Confidentiality
A piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encrypt or decrypt cryptographic data.
Key