Lesson 4.1.1
Lesson 3.1.1
Lesson 3.1.2
Lesson 3.1.3
100

An algorithm used for encryption or decryption

Cipher

100

Software that is intended to do harm or damage 

Malware

100

A operating system like UNIX

GNU

100

A program that allows a user to enter commands to interact with an operating system

Shell

200

Caesar, Vignere, and Affine are all the names of

Popular decoding methods (ciphers)

200

Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network


Social Media

200

The operating system used in Unit 3

Linux

200

A process in UNIX that runs without user input 

Background process

300

T/F: Ciphertext is the encrypted message generated by a cipher

True

300

The process of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers 

Phishing 

300

The selective process of allowing or restricting the availability of a resource

Access Control

300

The act of starting or launching a process

Spawn

400

T/F: Plaintext is the message that needs to be decrypted

False

400

The last segment of a web address; it follows immediately after the last “dot” symbol (.com, .net, .org)

Top-Level Domain

400

Software that is available to anyone who wants to use it

Open Source

400

Indicated by a vertical bar | in UNIX, connects or redirects output from one command to the input of another

Pipe

500

The science and art of delivering a message securely and confidentially


Cryptography

500

A broad category for techniques that aim to psychologically manipulate a person’s trust to gain access to data or computing resources, usually by being tricked into clicking on a link, opening a file, or answering a question

Social Engineering

500

A standard that computers use to represent letters, numbers, and symbols 

ASCII

500

The top-most directory denoted as /,  in UNIX

Root directory