I am used to navigate directories in Linux
cd
It's a unique identification label assigned to a device connected to a network. It helps locate and communicate with specific devices on the internet.
IP address
The reverse process of transforming plain text into ciphertext
Decryption
I am lengthy, complex , unique and I make your life hard if you foget me
Password
I am a triangle but I'm important in information security?
Tux!
The mascot of the Linux kernel
Tests basic connectivity by sending echo requests and measuring response times
ping tests basic connectivity by sending echo requests and measuring response times
I can be shared easily or I can be mathematically linked.
Symmetric Key Cryptography (Shared Secret Key)
Asymmetric Key Cryptography (Public Key and Private Key)
Advantages:
Disadvantages:
An attack that preys on human emotions and trust to trick them into giving away personal information or clicking malicious links.
Social engineering attacks
Be a Human Firewall:
Be Wary of Tactics:
What are these?
Data security best practices
I require you to enter your own user password to gain root access.
sudo
It is like a neighborhood street network. It connects houses (devices) within a close proximity and allows them to communicate efficiently.
LAN
The art and science of breaking ciphers
Cryptanalysis
Acts like a security guard for your computer network. It monitors incoming and outgoing traffic, deciding what gets in and what gets blocked. This helps shield your device from various cyber threats.
A firewall
A crucial process that helps organizations identify, analyze, and prioritize potential threats and vulnerabilities to their information systems and data.
Risk assessment
I change file permissions for user, group, and others and my twin changes file ownership
I'm a connection-oriented, reliable protocol with guaranteed delivery and error checking, suited for data transfer where order and accuracy are critical
TCP
It states that the security of a cryptosystem should rely solely on the secrecy of the key, not on the secrecy of the algorithm itself.
Kerckhoffs's Principle
Deceptive people can use information you share online to target you. They might pretend to be someone you know, exploit your interests, or use personal details to craft a believable con.
Social Engineering Scams
I connect the standard output of one command to the standard input of another.
Pipes (|)
A conceptual framework that divides network communication processes into seven distinct layers.
The OSI model:
Crack the following message: "phvvdjh phdqv wr wkh dqgdwlf"
"hello world this is a secret" Cesar