1.1.1
1.1.2
1.1.3
Commands/Powershell/
Python
100

collection of rules detailing appropriate student behavior in class

Code of Conduct

100

An emulation of a computer system

Virtual Machine

100

Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network

Social Media

100

an application that interprets operating system commands; in other words, it follows any system instructions you give it

Powershell

200

What is the trail that you leave behind when you engage in online experiences?

Digital Footprint

200

To guess or discover information, especially a password.

Crack

200

Irrelevant or inappropriate messaging sent through email to a large number of recipients;  also known as junk mail.

Spam

200

A collection of Python code or commands that perform some function

Python Script

300

a process that helps businesses and organizations protect information

The Cybersecurity Lifecycle

300

An attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible hoping one of the guesses is correct

Brute Force Attacks

300

Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.

Phishing

300

If I want to change my directory to the sub folder "Music" what command would I enter?

cd Music

400

 step 2 in the Cybersecurity Lifecycle

Protect

400

A systematic attempt to crack a password testing with words and phrases found in online dictionaries.

Dictionary Attack

400

The last segment of a web address; it follows immediately after the last "dot" symbol (.com, .net, .org, .gov)

Top-level-domain

400

Shows you the content of your directory 

dir

500

John is just learning about cybersecurity. He decides to make a mind map of his digital footprint. Which step of the cybersecurity lifecycle is he in

Step 1: Identify 

500

A process that converts human-readable text or data into a coded from. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion.

Encryption

500

A broad category for techniques that aim to psychologically manipulate a person's trust to gain access to data or computing resources, usually by being tricked into clicking on a link, opening a file, or answering a question.

Social Engineering

500

a command that changes the directory

cd

M
e
n
u