1
Programming
2
Cryptography
3
Cybersecurity Fundamentals
4
Ethical Hacking
5
Personal, Corporate & National Security
100

It is writing instructions for a computer to perform desired actions. (vocabulary)

What is Programming?

100

A cipher that generalizes the shift cipher. (vocabulary)

What is Vigenere?

100

Type of action with potential to cause harm. (vocabulary)

What is Threat?

100

Is hacking an illegal act? (Yes/No)

Yes

100

The three principles of Information Security. (words)

What are Confidentiality, Integrity and Availability?

200

The programming language we will be using with Raspberry Pi. (Name)

What is Scratch?

200

A technique that guarantees data integrity. (vocabulary)

What is Hashing?

200

Flaw or weakness that allows a threat agent to bypas security. (vocabulary)

What is Vulnerability?

200

Name of the website that stores email addresses associated with leaked password. (website address)

200

Definition of Confidential Principle.

What is the word for data which is accessed only by those with a business need?

300

Name two of many uses of programming (Example)

What are Mobile Apps, Video Games, Data Analytics, Websites and any piece of software?

300

This serves as a fingerprint or barcode for a message. (vocabulary)

What is Message Direct?

300

A fake email from a bank asking you to click a link and verify your account details is an example of ..... (vocabulary)

What is Phishing?

300
A person who gains unautorized access to a target network/system. (vocabulary)

What is Hacker?

300

Definition of Integrity Principle.

What is the word for data which is known to be correct and valid? (It has not been secretly modified without authorization.)

400

Name two of the four main parts in The Scratch Editor. (Labels)

What are Blocks Palette, Coding Area, The Stage and Sprite List?

400

Encryption techniques that require the sender and the receiver to agree on a private secret key. (vocabulary)

What is Symmetric Encryptions?

400

Define Social Engineering. (definition)

What terminology is the manipulation (psychological) technique that gets people to share private information for fraudulent purposes?

400

This is the first step in ethical hacking. (word)

What step is Reconnaissance?

400

This is the data which is always present to be accessed and processed.  Data is also protected in case of an event when data is lost, destroyed or corrupted. (vocabulary)

What is Availability Principle?

500

Give two reasons why programming is important in the cybersecurity field.

Identify Weak Areas & Coding to improve security (key points)

500

An English word that is encrypted to FMHHFYHQAUWZB by using the Vigenere cipher with a key DOG. (vocabulary)

What is Cybersecurity?

500

These three are the warning signs to look for in emails. (examples)

What are sender email address, domain names, spelling & formatting, attachments, urgency and asks for sensitive information?

500

This is the last step in ethical hacking. (word)

What step is Maintaining Access?

500

The #1 threat to corporation information security, accounting for 93% of breaches. (word)

What is Phishing?