The strategy of putting yourself inside the mindset of a potential attacker that allows you to anticipate attack strategies and defend your systems accordingly.
Think Like An Adversary
Name the two First Principles:
The quality of designing programs, systems, and processes to be free of complexity, easier to test, easier to operate, easier to protect.
The principle that the interface of a hardware or software should be independent of its implementation.
Simplicity / Abstraction
What happens when you shake the micro:bit?
It will clear the screen.
What are these letters using the Pigpen Cipher?
ok
Fill in the blanks:
Cybersecurity is the practice of ___________ systems, networks, and programs from digital __________.
protecting / attacks
The property that information or information systems are accessible and usable upon demand.
Availability
Name the two First Principles:
The principle of keeping information inaccessible except within the process itself.
Ensuring that programs or operating systems run completely separate from other programs or operating systems for the purpose of controlling access to system resources memory.
Data Hiding / Process Isolation
What needs to be pressed in order to show an umbrella?
The micro:bit logo above the LED screen.
Decode this word using the Pigpen Cipher:
star
Fill in the blanks:
Cyber ethics is acting __________ on the internet and using the internet as intended.
responsibly
A comprehensive strategy of including multiple layers of security within a system so that if one layer fails, another layer of security is already in place to stop the attack/unauthorized access.
Defense in Depth
Name the two First Principles:
Keeping all design and functionality aspects to a minimum, reducing needless size and complexity.
The process of separating functionality into independent pieces to ensure each piece performs a separate function and keeps its own data.
Minimization / Modularization
Which symbol will show first on a micro:bit?
The checkmark under “on start” will show first.
Decode this word using the Pigpen Cipher:
caesar
Name three phishing attacks that we covered during camp
Angler phishing, Email Phishing, Pharming, Smishing, Spear phishing, Vishing
The strategy of designing information and security systems to be configured and operated as simply as possible; all systems perform best when they have simple designs rather than complex ones.
Keep It Simple
Name the two First Principles:
The process of providing multiple layers of protection or controls between critical data and attackers; layered security can be considered one step of defense-in-depth strategy.
Implies that data, processes, and systems should logically define their area of control (domain).
Layering / Domain Separation
What will show on the micro:bit if the sound threshold is set to 128?
Nothing. The loudness level needs to be more than 150 to show the checkmark.
Caesar Cipher - Shift of 10
Decode this message:
AESMU LBYGX PYH TEWZC
Quick brown fox jumps
A strong password has a mix of what things?
A mix of symbols, numbers, and lowercase and uppercase letters
Name the two Concepts
The property that information is not disclosed to individuals, devices, or processes unless they have been authorized to access the information
The property that information, an information system, or a component of a system has not been modified or destroyed in an unauthorized manner.
Confidentiality & Integrity
Name the two First Principles:
The process of separating an entity (system, object or hardware) to include and isolate its own data.
The principle of allowing entities (people, processes, devices) only the capabilities necessary to accomplish their assigned duties and functions.
Resource Encapsulation / Least Privilege
What is the error that causes this program not to work?
On the if statement, user needs to change the not equals to sign to equals sign.
Caesar Cipher - Shift of 18
Decode this message:
GNWJ LZW DSRQ VGY
over the lazy dog
What is a branch of artificial intelligence and computer science which focuses on the use of data and algorithms to imitate the way humans learn, gradually improving its accuracy?
Machine learning