GenCyber
Core Concepts
GenCyber
First Principles
Threats &
Vulnerabilities
Data Hiding & Cryptography
Cyber
Hygiene
100

This core concept involves preventing unauthorized users from accessing or manipulating data.

What is Confidentiality?

100

This GenCyber First Principle involves placing multiple layers of protection between critical data and attackers.

What is Layering?

100

A "malicious software" designed to disrupt, damage, or otherwise compromise a system.

What is Malware?

100

This type of cipher involves shifting each letter a certain number of spaces down the alphabet.

What is a Caesar cipher?

100

A software designed to detect and destroy computer viruses.

What is Antivirus?

200

This core concept involves placing oneself in the mind of an attacker.

What is Thinking Like an Adversary?

200

This GenCyber First Principles involves allowing entities only the privileges that are necessary to complete the desired task.

What is Least Privilege?

200

The practice of sending fraudulent communications (such as emails or phone calls) to gain information or facilitate an attack.

What is Phishing?

200

This data-hiding strategy involves concealing information within non-secret items such as images.

What is Steganography?

200

A computer program that assists in storing and generating passwords.

What is a Password Manager?

300

This core concept involves ensuring that legitimate users can access their data in a timely manner.

What is Availability?

300

This GenCyber First Principles involves keeping a hardware or software's interface separate from its implementation.

What is Abstraction?

300

This type of malware prevents users from accessing their data until a sum of money is paid.

What is Ransomware?

300

A function used to convert data into a unique, irreversible string of characters?

What is a Hash?

300

Requiring multiple authentication methods (such as passwords, keycards, or fingerprint scanners) to access a device.

What is Multi-Factor Authentication?

400

This core concept involves reducing vulnerabilities by preventing unnecessary complexity.

What is Keep it Simple?

400

This GenCyber First Principle involves keeping design functionality to a minimum.

What is Minimization?

400

The psychological manipulation of people into performing actions desired by an attacker.

What is Social Engineering?

400

A virtual currency secured by cryptography, making it difficult to duplicate or forge.

What is a Cryptocurrency?

400

Extending a private network over a public network so that remote users can access it.

What is a Virtual Private Network (VPN)?

500

This core concept involves ensuring the completeness and accuracy of data.

What is Integrity?

500

This GenCyber First Principle involve separating functionality into independent pieces that perform separate functions and keep their own data.

What is Modularity?

500

This threat to an organization comes from people within that organization, such as employees or business associates.

What are Insider Threats?

500

This data hiding technique includes false messages alongside real ones, making it difficult for attackers to know which information is correct.

What is Chaffing and Winnowing?

500

A security system that monitors and controls network traffic.

What is a Firewall?