The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.
The protection of information from people who are not authorized to view it.
Aims at ensuring that information is protected from unauthorized or unintentional alteration.
The assurance that systems and data are accessible by authorized users when and where needed.
A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.
A widely agreed upon set of rules that standardize communication between machines.
A group of two or more computer systems linked together.
Examples of servers include web servers, mail servers, and file servers. Each of these servers provide resources to client devices. Most servers have a one-to-many relationship with clients, meaning a single server can provide multiple resources to multiple clients at one time.
A network device that allows a device to connect to the Internet.
An access point that allows for network management and security configuration.
In cyber security, a connecting point refers to any physical or logical location where a device or system connects to a network, enabling data exchange. These connecting points, also known as endpoints, are crucial entry points for cyberattacks, as threat actors can exploit vulnerabilities at these locations to gain unauthorized access to networks and data.
The usage of deceptive emails and websites to maliciously gather personal information
Ransomware is a type cyber attack that threatens to publish the victim's data or block access to it unless a ransom is paid.
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
Protection of computer systems, networks, and data from digital attacks.
Scrambling digital information into an unreadable form. Only those with verified authority (password, key, etc) can unscramble it to read it.
An encryption method in which each letter of the message is shifted by a certain amount, called the key
The conversion of encrypted data into its original form.
the process of converting information or data, usually to prevent unauthorized access
A person or device that makes calculations, stores data, and executes instructions according to a program.
Programs that can be run on a computer
The primary software that runs applications and manages all the hardware, memory and other software on a computer.
The physical components of a computer
A circuit board with ports and sockets used to connect the main devices of a computer.
The core component of a device that accepts and executes instructions.
A fast type of computer memory which temporarily stores all the information your device needs right away.
A data storage device that uses magnetic storage and rapidly rotating disks to store and retrieve digital information.
Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.
A programming language is any set of rules that converts strings, or graphical program elements in the case of visual programming languages, to various kinds of machine code output.
Defining a function means to teach the computer a new command and explain what it should do when receiving that command.
Calling a function actually gives the command, so the computer will run the code for that function.
A block of reusable code that is used to perform a task.
Commenting out code makes the computer ignore it, so it does not run.
Top down design is a method for breaking our program down into smaller parts.
An if statement lets you ask a question to the program and only run code if the answer is true.
A statement that evaluates to true or false.
Control structure that lets us run either one section of code or another depending on a test.
Sets the color used to fill shapes.
Sets the color used to fill shapes using RGB values.
Sets the color used to fill shapes to a grayscale value.
Sets the color used to draw lines and borders around shapes.
Sets the color used to draw lines and borders around shapes to a grayscale value
Sets the color used to draw lines and borders around shapes using RGB values
Disables drawing the stroke (outline)
A color model in which red, green, and blue light are added together in various ways to reproduce a color
A way of representing a color from various color models using hexadecimal values
A collection of colors used together in one medium
Declaring a variable is defining it for the first time.
Initializing a variable is giving it an initial value.
A built-in variable provided by p5.js
System variable that stores the width of the drawing canvas. This value is set by the first parameter of the `createCanvas()` function.
System variable that stores the height of the drawing canvas. This value is set by the second parameter of the `createCanvas()` function.
A form of art that rapidly displays a sequence of still images to create an illusion of movement
A single image in a sequence of pictures
The rate at which consecutive frames are captured or displayed
Specifies the number of frames to be displayed every second
A p5.js system variable that contains the number of frames that have been displayed since the program started
A gradual blend of one color to another.
The changes done in the shapes on a coordinate plane by scaling, translating, or rotating.
Slides or moves the shape
Expands or contracts the shape
A measurement of a plane angle in which one full rotation is 360 degrees
The SI unit for measuring angles
Sets the amount to shift the origin of the canvas. The x parameter specifies left/right translation, the y parameter specifies up/down translation.
Rotates a shape by the amount specified by the angle parameter
Increases or decreases the size of a shape by expanding or contracting vertices.
Rotates or turns the shape around an axis
A system variable that contains the current horizontal position of the mouse
A system variable that contains the current vertical position of the mouse
A system variable that tracks of which mouse button is pressed. Its value can be either LEFT, RIGHT, or CENTER depending on which button was pressed last
A system variable that contains the value of the most recent key on the keyboard that was typed
Checks if a given key is currently down
A system variable that returns `true` if any key is pressed and `false` is no keys are pressed
Numeric values that correspond to physical keys on the keyboard
Called once when the program starts and is used to define the initial environment properties.
Continuously executes the lines of code contained inside its block until the program is stopped.
Creates a canvas element in the document and sets the dimensions of it in pixels.
Draws an ellipse to the screen given the x, y coordinate and the width and height (height is optional).
Draws a rectangle to the screen given the x, y coordinate and the width and height (height is optional).
Draws a line (direct path between two points) to the screen. The first two parameters x1, y1 control the position of the first point and the last two parameters x2, y2 control the position of the second point.