We learned that this small piece of text data is sent from a website and stored in your web browser to remember things like your login state or shopping cart.
What is a Cookie?
This ancient substitution cipher shifts the alphabet by a certain number of spaces and was famously used by a Roman emperor.
What is the Caesar Cipher?
This two-letter command lists the files and directories in your current working directory.
What is ls?
This deceptive attack involves tricking individuals into revealing sensitive information, often via fake emails or websites.
What is Phishing?
Before they revolutionized the personal computer industry and started a trillion-dollar company in a local garage, these two tech pioneers walked the exact same halls we do here at Homestead High School. Name both of them.
Who are Steve Jobs and Steve Wozniak? OR Who are the two Steves?
We discussed how this security system acts as a barrier, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules.
What is a Firewall?
This is the process of converting readable plaintext into an unreadable format to prevent unauthorized access.
What is Encryption?
Use this two-letter command to change your current directory and navigate through the file system.
What is cd?
This type of malicious software is designed to block access to a computer system or files until a sum of money is paid.
What is Ransomware?
This nostalgic aesthetic from the early 2000s—featuring low-res digicams, flip phones, and metallic colors—has seen a massive revival recently.
What is Y2K?
We covered how the internet communicates. The "S" in HTTPS stands for "Secure", but what does the "P" stand for in HTTP, FTP, and IP?
What is Protocol?
In asymmetric cryptography, you share this specific key with the world so anyone can send you encrypted messages.
What is a Public Key?
This command is most commonly used to print the entire contents of a text file directly to the terminal screen.
What is cat?
This term describes an ethical hacker who attempts to break into a system to find and patch vulnerabilities before malicious actors can exploit them.
What is a White Hat hacker?
In the iconic movie The Matrix, Neo is offered two pills; swallowing this color pill allows him to wake up in the real world.
What is the Red Pill?
In our meeting on decentralized tech, we learned that this technology functions as a distributed, public digital ledger used to record transactions across many computers. We also modeled these transactions with a whiteboard activity.
What is a Blockchain?
This famous electromechanical machine was used by the Germans in WWII to encrypt messages and was cracked by Alan Turing's team at Bletchley Park.
What is the Enigma machine?
If you need to search for a specific string of text or pattern within a file, this command is your best friend.
What is grep?
A DDoS attack aims to overwhelm and disrupt the normal traffic of a targeted server. DDoS stands for this.
What is a Distributed Denial of Service?
Before moving to its massive Redmond headquarters to build the Windows empire, this iconic tech company was actually founded in Albuquerque, New Mexico in 1975.
What is Microsoft?
This conceptual framework characterizes networking communication into 7 distinct layers, starting with the Physical layer at the bottom and ending with the Application layer at the top.
What is the OSI Model?
The security of this famous public-key cryptosystem relies entirely on the mathematical difficulty of factoring the product of two very large prime numbers.
What is RSA?
This command is used to change the access permissions of a file or directory, such as making a script executable.
What is chmod?
This classic web vulnerability allows an attacker to interfere with the queries an application makes to its database, often by inserting malicious code into entry fields.
What is SQL Injection?
This 19th-century mathematician, who wrote an algorithm for Charles Babbage's early mechanical computer, is widely recognized as the world's first computer programmer.
Who is Ada Lovelace?