CYBER SECURITY & ETHICS TEST (Plz Plz)
Name the three categories included with digital citizenship
Connect Protect Respect
Morse Code
Different combinations of dots and dashes that represent each letter of the alphabet
What is usually used for secure online communication?
Public-Key Cryptography
Why do hackers hack?
To make discoveries, Protect Information, steal information of money, or even expose corruption
What is a network?
a group of connected computers and devices
Baconian Cipher
A chart explaining how to translate the made up language of Baconian which consists of "A"s & "B"s
Which one of the following statement is a NOT hack? A) Using a bicycle to power a computer B) Stealing an unlocked bicycle C) Creating a kinetic bicycle sculpture D) Building a working bicycle out of discarded umbrellas
B) Stealing an unlocked bicycle
Digital Footprint
Digital footprint is the traces you leave behind online Ex: History, Cookies, and IP
What are the dots and lines in Morse code called?
Dits & Dahs
What did the identity-theft crime ring do with "Tim's" photo?
Figure out his address
What 3 groups exploit cyber vulnerabilities for their gain?
Government, Criminals, and Hacktivist
How can you tell if a website encrypts its traffic?
Look for the lock symbol in a URL
Cyber Security
Measures taken to protect a computer or computer system against unauthorized access or attack
What can you trust to be 100% secure all the time?
NOTHING
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
Intellectual Property
Property derived from the work of human intellect. Intellectual property laws cover a wide range of property created by artists, authors, inventors, and musician, and protect copyrights, patents, trademarks, and trade secrets.
Digital Literacy
The ability to use information found online in a useful manner
Why are cyber vulnerabilities unlikely to ever go away?
They are side effects of the freedom and ease of communicating online
Pigpen Cipher
a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid
Acceptable Use Policy
a policy that a user must agree to follow in order to be provided access to a network or to the internet
Cookies
small computer programs left behind on your computer when you visit a website
e-commerce
the buying and selling of goods over the internet
Cyber Bullying
the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
Public Key Cryptography
uses two keys: A public key the sender uses to create encrypted messages, and a mathematically-related private key that the receiver can use to decrypt messages encrypted by that public key.