A flaw or bug in the system that can be exploited.
What is vulnerability?
A message in its encrypted form.
What is Ciphertext?
Data type made of whole numbers.
What is an integer?
Most commonly emails that leverage your emotions to extract important information from you.
What is Phishing?
3rd stage of digital forensics, (most difficult stage).
What is analysis?
Software written to harm, steal, or annoy.
What is a malware?
Uses different keys for encryption and decryption
What is Asymmetric cryptography?
Integers, floats and strings.
What is data types?
Software that binds itself to another software or computer program to harm the computer system.
What is a virus?
Open-source operating system, widely used in transportation, entertainment and even space.
What is Linux?
Convert to decimal: 010010
What is 18?
Digital fingerprint, used to check data for authenticity.
What is hashing (hashes)?
Temporary locations in memory where information is stored.
What is a variable?
Type of malware that holds your files hostage and encrypts them.
What is ransomware?
Recreation of humanity’s thought processing ability into machinery.
What is Artificial Intelligence (AI)?
Protects the user from malicious web traffic by controlling what comes in and out.
What is a firewall?
Encryption done by shifting the alphabet 3 places.
What is Caesar cipher?
Group of functions gathered together by a programmer or company, often imported.
What is a library?
The direct psychological manipulation of people to achieve goals.
What is social engineering?
Concept of hooking up anything with an on/off switch to a network on the Internet.
What is Internet of Things (IoT)?
They work by connecting digital devices together.
What is networks?
The art of hiding confidential information within plan sight.
What is Steganography?
What is the truth value:
not(74 >= 22 and 66 < 110)
What is false?
Attackers forcefully using computers to guess password.
What is brute force?
Percentage of cyber security breaches due to human error.
What is 95%?