Programming
Two programming languages we will be using with Raspberry Pi 400.
What is Scratch 3 and Python?
Another name for Caesar Cipher
What is a Shift Cipher?
The practice of protection of internet-connected systems such as hardware, software and data from cyberattacks.
What is Cybersecurity?
A virtual computer running inside a physical computer.
What is a Virtual Machine?
Identify three pillars of personal cybersecurity.
What are data protection, device security & online privacy in personal cybersecurity?
The name of the operating system Raspberry Pi is using.
What is Linux Debian?
The inverse of encryption.
What is Decryption?
An example of analogy of cybersecurity
What is home security?
Name a Linux-based penetration testing platform that provides a broad array of testing tools and includes over 300 tools by default.
What does Kali Linux?
Identify two things you can do to improve device security related to apps.
What is the purpose in download from legitimate sources & remove any apps you no longer use/need?
The writing instructions for a computer to perform desired actions.
What is Programming?
An average number of attempts in breaking a cipher text of an English message using Caesar Cipher.
What is 13 attempts?
Something of value that is stored digitally.
What is Digital Asset?
Name at least two command lines to obtain the IPv4 address from a Linux operating system.
What is ip a, ip address or ifconfig?
Identify two types of backups used.
How are Local Physical Storage and Cloud Storage used for?
Identify two uses of programming.
How are Mobile Apps, Video Games, Data Analytics, Websites & Software being built?
Name the usual technique for cracking a substitution cipher.
What is Frequency Analysis?
Identify three examples of devices that store digital assets.
What are mobile phones, computers, IoT devices, cars, credit/debit card and/or WiFi routers?
Identify two Hypervisors that you can install free of charge on your home machine for non-commercial purposes.
What are VMware Player and Oracle VirtualBox?
Explain why bookmarking a site you visit often is a good security practice.
If you get an email you think is phishing and may have fake links, do not click on the links and use the bookmark links to go directly to the correct website so you know you are logging into the right site.
Identify two reasons why programming is important in Cybersecurity field.
How to read & interpret the code to identify the weak areas for malicious activities, writing code to improve security, and (or) enhance logical & analytical skills important in Cybersecurity field?
A word is encrypted using Caesar Cipher as BZIQV. The third letter of that word is 'A'. The decrypted word is______ using a shift of _____.
What is the encryption of TRAIN in Caesar Cipher using a shift of 8?
Identify three examples of Digital Assets.
What are bank account, digital wallet, social media, website logins, medical information, email, text and/or apps?
The malicious hacker's ultimate goal when exploiting vulnerabilities.
Whose main goal is gaining unauthorized access to computers, networks and file?
Explain how to improve security at home with network devices that do not receive frequent updates like Smart TVs, security cameras or gaming consoles.
Why do you place Smart TV, gaming console or security camera on a separate guest wifi network not the main wifi network used by home computers, laptops or smartphones?