Vocabulary
Binary/Hexadecimal
Pillars of Cybersecurity
Hacking Community
Malware
100

the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.

What is Cybersecurity?

100

Write decimal 73 in binary

What is 1001001?

100

This is the assurance that information is not disclosed to unauthorized individuals, groups, processes, or devices. 


What is Confidentiality?

100

These people may perform network penetration tests in attempt to compromise networks and systems by using their knowledge of computer security systems to discover network vulnerabilities.

What are white hat hackers?

100

threatens to publish the victim’s personal data or permanently block access to it unless a ransom is paid off

What is ransomware?

200

The study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.

What is cryptography?

200

Write decimal 99 in binary

What is 1100011?
200

 This security measure is designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific information.

What is Authentication?

200

Threat actors can be divided into different types based on their methods and motivations. This type of hacker usually targets government agencies, corporations, or other entities they are protesting

What is a hacktivist?

200

causes pop-up and pop-under advertisements on user's system.  Often installs with bundles of freeware programs or when visiting a web site with it running in the background.

What is adware?

300

provide hackers with complete administrative access to the remote system an can bypass security such as firewall

What is a back door?

300

Write hexadecimal A in binary

What is 1010?

300

The accuracy and completeness of vital information must be safeguarded. Data should not be altered or destroyed during transmission and storage.

What is integrity?

300

These hackers primary motivation is to find weaknesses in a companies security to then either get paid by the company or to expose the weakness to other hackers.

What is a gray hat hacker?
300

sluggish internet, programs crashing, settings changed, passwords changed, these are a few of the signs of this...

What is how to detect malware on your computer?

400

A group of eight bits joined together. Eight bits put together. 10100000

What is a Byte?

400

Write 11110001 in hexadecimal.

What is F1?

400

Assurance that the sender of information is provided with proof of delivery

What is non-repudiation of user data?

400

This hacker's primary motivation is financial/personal gain.

What is a black hat hacker?
400

Software that enables a user to obtain secret information about another computer's activities.

What is spyware?

500

the most common format for text files in computers on the internet where each character is represented by a unique 7-bit binary code

What is ASCII?

500

Write binary 01011101 in hexadecimal. 

What is 5D?

500

Maintaining equipment, performing hardware repairs, keeping operating systems and software up to date, and creating backups ensure the availability of the network and data to the authorized users.

What is availability?

500

 The term originates from 1950s westerns

What is a black hat hacker?

500

Computer software used to prevent, detect and remove malicious software

What is antivirus?