Core Concepts
This core concept involves preventing unauthorized users from accessing or manipulating data.
What is Confidentiality?
This GenCyber First Principle involves placing multiple layers of protection between critical data and attackers.
What is Layering?
A "malicious software" designed to disrupt, damage, or otherwise compromise a system.
What is Malware?
This type of cipher involves shifting each letter a certain number of spaces down the alphabet.
What is a Caesar cipher?
A software designed to detect and destroy computer viruses.
What is Antivirus?
This core concept involves placing oneself in the mind of an attacker.
What is Thinking Like an Adversary?
This GenCyber First Principles involves allowing entities only the privileges that are necessary to complete the desired task.
What is Least Privilege?
The practice of sending fraudulent communications (such as emails or phone calls) to gain information or facilitate an attack.
What is Phishing?
This data-hiding strategy involves concealing information within non-secret items such as images.
What is Steganography?
A computer program that assists in storing and generating passwords.
What is a Password Manager?
This core concept involves ensuring that legitimate users can access their data in a timely manner.
What is Availability?
This GenCyber First Principles involves keeping a hardware or software's interface separate from its implementation.
What is Abstraction?
This type of malware prevents users from accessing their data until a sum of money is paid.
What is Ransomware?
A function used to convert data into a unique, irreversible string of characters?
What is a Hash?
Requiring multiple authentication methods (such as passwords, keycards, or fingerprint scanners) to access a device.
What is Multi-Factor Authentication?
This core concept involves reducing vulnerabilities by preventing unnecessary complexity.
What is Keep it Simple?
This GenCyber First Principle involves keeping design functionality to a minimum.
What is Minimization?
The psychological manipulation of people into performing actions desired by an attacker.
What is Social Engineering?
A virtual currency secured by cryptography, making it difficult to duplicate or forge.
What is a Cryptocurrency?
Extending a private network over a public network so that remote users can access it.
What is a Virtual Private Network (VPN)?
This core concept involves ensuring the completeness and accuracy of data.
What is Integrity?
This GenCyber First Principle involve separating functionality into independent pieces that perform separate functions and keep their own data.
What is Modularity?
This threat to an organization comes from people within that organization, such as employees or business associates.
What are Insider Threats?
This data hiding technique includes false messages alongside real ones, making it difficult for attackers to know which information is correct.
What is Chaffing and Winnowing?
A security system that monitors and controls network traffic.
What is a Firewall?