Programming
It is writing instructions for a computer to perform desired actions.
What is Programming?
A cipher that generalizes the shift cipher.
What is Vigenere?
Type of action with potential to cause harm.
What is Threat?
This is a step in ethical hacking when an attacker gathers as much information as possible about a target before launching an attack.
What is reconnaissance?
The three principles of Information Security.
What are Confidentiality, Integrity and Availability?
Two programming language we will be using with Raspberry Pi.
What is Scratch & Python?
A technique that guarantees data integrity.
What is Hashing?
Flaw or weakness that allows a threat agent to bypas security.
What is Vulnerability?
An unauthorized user who attempts to/gain access to an information system.
Who is a hacker?
Definition of Confidential Principle.
What is the word for data which is accessed only by those with a business need?
Scratch 3 is a ________ -based programming language.
visual
A simple cipher that uses multiplication as part of its encryption.
What is Affine Cipher?
A fake email from a bank asking you to click a link and verify your account details is an example of .....
What is Phishing?
A comprehensive collection of words, phrases or passwords that can be used for various security-related activities.
What is a wordlist?
Definition of Integrity Principle.
What is the word for data which is known to be correct and valid? (It has not been secretly modified without authorization.)
Programmer will write the program in this area using Python IDE.
What is Script Editor?
Encryption techniques that require the sender and the receiver to agree on a private secret key.
What is Symmetric Encryption?
Define Social Engineering.
What terminology is the manipulation (psychological) technique that gets people to share private information for fraudulent purposes?
A software layer installed on the physical hardware.
What is a hypervisor?
This is the data which is always present to be accessed and processed. Data is also protected in case of an event when data is lost, destroyed or corrupted.
What is Availability Principle?
Give two reasons why programming is important in the cybersecurity field.
Identify Weak Areas & Coding to improve security (key points)
An English word that is encrypted to FMHHFYHQAUWZB by using the Vigenere cipher with a key DOG.
What is Cybersecurity?
Identify three warning signs to look for in emails.
What type of signs are sender email address, domain names, spelling & formatting, attachments, urgency and asks for sensitive information these?
Name of the website that stores email addresses associated with leaked password.
What is https://haveibeenpwned.com/?
The #1 threat to corporation information security, accounting for 93% of breaches.
What is Phishing?