CONCEPTS
FIRST PRINCIPLES
BLOCK CODING
CIPHERS
CYBER
SECURITY
100

The strategy of putting yourself inside the mindset of a potential attacker that allows you to anticipate attack strategies and defend your systems accordingly.

Think Like An Adversary

100

Name the two First Principles:

The quality of designing programs, systems, and processes to be free of complexity, easier to test, easier to operate, easier to protect.

The principle that the interface of a hardware or software should be independent of its implementation.

Simplicity / Abstraction

100

It will clear the screen.

100

Fill in the blanks:

Cybersecurity is the practice of ___________ systems, networks, and programs from digital __________.

protecting / attacks

300

The property that information or information systems are accessible and usable upon demand.

Availability

300

Name the two First Principles:

The principle of keeping information inaccessible except within the process itself.

Ensuring that programs or operating systems run completely separate from other programs or operating systems for the purpose of controlling access to system resources memory.

Data Hiding / Process Isolation

300

The micro:bit logo above the LED screen.

300

Fill in the blanks:

Cyber ethics is acting __________ on the internet and using the internet as intended.

responsibly

500

A comprehensive strategy of including multiple layers of security within a system so that if one layer fails, another layer of security is already in place to stop the attack/unauthorized access.

Defense in Depth

500

Name the two First Principles:

Keeping all design and functionality aspects to a minimum, reducing needless size and complexity.

The process of separating functionality into independent pieces to ensure each piece performs a separate function and keeps its own data.

Minimization / Modularization

500

The checkmark under “on start” will show first.

500

Name three phishing attacks that we covered during camp

Angler phishing, Email Phishing, Pharming, Smishing, Spear phishing, Vishing

700

The strategy of designing information and security systems to be configured and operated as simply as possible; all systems perform best when they have simple designs rather than complex ones.

Keep It Simple

700

Name the two First Principles:

The process of providing multiple layers of protection or controls between critical data and attackers; layered security can be considered one step of defense-in-depth strategy.

Implies that data, processes, and systems should logically define their area of control (domain).

Layering / Domain Separation

700

What will show on the micro:bit if the sound threshold is set to 128? 

Link: https://docs.google.com/presentation/d/1dWc6GGHB2ozGxsjrrWwt8newjjYJyxajZkKihSuj7qk/edit#slide=id.g219045bf38b_0_29

Nothing. The loudness level needs to be more than 150 to show the checkmark.

700

Caesar Cipher - Shift of 10

Decode this message:

AESMU LBYGX PYH TEWZC

Quick brown fox jumps

700

A strong password has a mix of what things?

A mix of symbols, numbers, and lowercase and uppercase letters

1000

Name the two Concepts

The property that information is not disclosed to individuals, devices, or processes unless they have been authorized to access the information

The property that information, an information system, or a component of a system has not been modified or destroyed in an unauthorized manner.

Confidentiality & Integrity

1000

Name the two First Principles:

The process of separating an entity (system, object or hardware) to include and isolate its own data.

The principle of allowing entities (people, processes, devices) only the capabilities necessary to accomplish their assigned duties and functions.

Resource Encapsulation / Least Privilege

1000

On the if statement, user needs to change the not equals to sign to equals sign.

1000

Caesar Cipher - Shift of 18

Decode this message:

GNWJ LZW DSRQ VGY

over the lazy dog

1000

What is a branch of artificial intelligence and computer science which focuses on the use of data and algorithms to imitate the way humans learn, gradually improving its accuracy?

Machine learning

M
e
n
u