Home


Resources

What does Capture the Flag mean?

Capture the Flag (CTF) competitions are common in the cybersecurity community, especially among students. Participants come together virtually to complete cybersecurity challenges to earn flags to gain points. In this CTF, you will gain the cache flag by completing a short quiz on the cache page. You will then enter the cache flag into the Coordinate Retrieval page on this site to gain the coordinates to the cache. Unless otherwise stated in the flag script once you get the coordinates, the coordinates you gain from the flag input script on the quiz page (or the Coordinate Retrieval Page which you can access from the Home page) are the coordinates where the cache is hidden.

What is Cybersecurity?

Cybersecurity is the practice of securing computer systems from unwanted access, intrusion, modification, or spying. All people who use a computer need to have a basic understanding of best practices online and what cybersecurity professionals do so that they can best protect themselves. Cybersecurity is a broad discipline, including encryption/decryption (cryptography), ethical hacking, penetration testing, system configuration, incident response, forensics, and mitigation, antivirus development, malware removal/remediation, and so much more. This series of caches will educate you about different aspects of the important field of cybersecurity.


What should I do to protect myself online?


What are the different kinds of attacks that happen?

Malware is code that damages a system, steals information, or does other bad things when it is run. Everything below is a type of malware.


What is Cryptography and how does it relate to Cybersecurity?

Cryptography is the practice of encrypting messages or numerical codes so that they can not be read without decrypting them. Here are some common types of cryptographic codes:


This information came from my own knowledge as well as information from CyberPatriot, the world's largest youth cybersecurity competition.


This information is in no way, shape, or form a comprehensive overview of the field of cybersecurity. As more caches are added to the series, more information will be added to this page.