"Cyber" What!
Breaking In!
Shhh...It's A Secret!
Principles
Potpourri
100

The best camp to learn about cybersecurity and cybersafety

Gencyber

100

Malware that has an embedded keylogger

Spyware

100
A human effort to trick an individual into giving secret or private information

Social Engineering

100

The strategy of designing information and securing systems to be configured and operated as simple as possible

Keep It Simple

100

A hidden message

Code

200

The moral principle that governs a person's behavior in an online environment

Cyber Ethics

200

Malware that locks up user's files and demands a fee to unlock them

Ransomware

200

Receiving an email from JoeBanker@WhalesFargo.com informing you that he needs your login credentials is an example of...

Phishing

200

C.I.A. 

Confidentiality, Integrity, Availability

200

Typically a person who uses computers to gain unauthorized access to data

Hacker

300

The state of being protected against criminal or unauthorized access of electronic data, or measures taken to achieve this

Cybersecurity

300

The art/science of writing and breaking codes

Cryptography

300

A software or hardware designed to block unauthorized access while allowing outward communication.

Firewall

300

Putting yourself in the mindset of someone who may potentially attack your system in order to adequately defend yourself

Think Like An Adversary

300

A unique string of characters that identifies each computer over a network

IP Address

400

 Creating an Instagram account for the worst dressed students in school could be an example of


Cyberbullying

400

Malware that downloads onto a computer disguised as a legitimate program.

Trojan Horse

400

I received a text message asking me to call Bank of America. I don't even own a bank account there... This is an example of...

Smishing 

400

Multiple layers of security for a system. If one layer fails, another system is in place.

Defense in Depth

400

The act of hacking, or breaking into a computer system, for politically or socially motivated purposes

Hacktivist

500

This profession plans and carries out security measures to protect a company's computer networks and systems.

Cybersecurity Analyst

500

Malware that can self replicate and is very dangerous to networks.

Worm

500

Phishing scams targeting people holding high positions in an organization or business

Whaling

500

This principle is concerned with only allowing authorized individuals to have access to a system or resources

Confidentiality

500

A piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm can encode or decode cryptographic data.

Key