collection of rules detailing appropriate student behavior in class
Code of Conduct
An emulation of a computer system
Virtual Machine
Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network
Social Media
an application that interprets operating system commands; in other words, it follows any system instructions you give it
Powershell
What is the trail that you leave behind when you engage in online experiences?
Digital Footprint
To guess or discover information, especially a password.
Crack
Irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail.
Spam
A collection of Python code or commands that perform some function
Python Script
a process that helps businesses and organizations protect information
The Cybersecurity Lifecycle
An attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible hoping one of the guesses is correct
Brute Force Attacks
Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
Phishing
If I want to change my directory to the sub folder "Music" what command would I enter?
cd Music
step 2 in the Cybersecurity Lifecycle
Protect
A systematic attempt to crack a password testing with words and phrases found in online dictionaries.
Dictionary Attack
The last segment of a web address; it follows immediately after the last "dot" symbol (.com, .net, .org, .gov)
Top-level-domain
Shows you the content of your directory
dir
John is just learning about cybersecurity. He decides to make a mind map of his digital footprint. Which step of the cybersecurity lifecycle is he in
Step 1: Identify
A process that converts human-readable text or data into a coded from. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion.
Encryption
A broad category for techniques that aim to psychologically manipulate a person's trust to gain access to data or computing resources, usually by being tricked into clicking on a link, opening a file, or answering a question.
Social Engineering
a command that changes the directory
cd