An algorithm used for encryption or decryption
Cipher
Software that is intended to do harm or damage
Malware
A operating system like UNIX
GNU
A program that allows a user to enter commands to interact with an operating system
Shell
Caesar, Vignere, and Affine are all the names of
Popular decoding methods (ciphers)
Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network
Social Media
The operating system used in Unit 3
Linux
A process in UNIX that runs without user input
Background process
T/F: Ciphertext is the encrypted message generated by a cipher
True
The process of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers
Phishing
The selective process of allowing or restricting the availability of a resource
Access Control
The act of starting or launching a process
Spawn
T/F: Plaintext is the message that needs to be decrypted
False
The last segment of a web address; it follows immediately after the last “dot” symbol (.com, .net, .org)
Top-Level Domain
Software that is available to anyone who wants to use it
Open Source
Indicated by a vertical bar | in UNIX, connects or redirects output from one command to the input of another
Pipe
The science and art of delivering a message securely and confidentially
Cryptography
A broad category for techniques that aim to psychologically manipulate a person’s trust to gain access to data or computing resources, usually by being tricked into clicking on a link, opening a file, or answering a question
Social Engineering
A standard that computers use to represent letters, numbers, and symbols
ASCII
The top-most directory denoted as /, in UNIX
Root directory