This project uses Streamlit and Google Generative AI. Follow the steps below to set up the environment, install dependencies, and run the application.
- Python 3.7 or higher
- pip (Python package installer)
-
Clone the repository:
git clone https://github.com/djmahe4/CyberSecurity-Quiz cd CyberSecurity-Quiz
-
Create and activate a virtual environment (optional but recommended):
python -m venv venv source venv/bin/activate # On Windows use `venv\Scripts\activate`
-
Install the required packages:
pip install -r requirements.txt
-
Set up the Google Generative AI API key:
- Go to https://ai.google.dev to get the API key.
- Add your API key to the
.env
file:
GENERATIVE_AI_KEY='your_api_key_here'
-
Run the
main.py
script:streamlit run main.py
-
Go to http://localhost:8501 to view and interact with the app
-
Ensure that your
.env
file is not included in version control to keep your API key secure. -
For more information on obtaining a Google Generative AI API key, refer to the Google AI documentation.
"Smart Contract Vulnerabilities", "Blockchain Data Encryption", "Cryptographic Hash Functions", "Digital Signature Algorithms", "Blockchain Network Consensus Mechanisms", "Blockchain Scalability and Performance", "Blockchain Regulatory Compliance", "Blockchain Identity Management", "Blockchain Access Control", "Blockchain Data Integrity",
"IoT Device Authentication", "IoT Network Security Protocols", "IoT Data Encryption Methods", "IoT Device Vulnerability Management", "IoT Secure Communication Protocols", "IoT Data Analytics Security", "IoT Cloud Security", "IoT Endpoint Security", "IoT Firmware Security", "IoT Secure Boot Mechanisms",
"Public-Key Cryptography", "Symmetric-Key Cryptography", "Hash Functions", "Digital Signatures", "Key Exchange Algorithms", "Elliptic Curve Cryptography", "Quantum Cryptography", "Homomorphic Encryption", "Zero-Knowledge Proofs", "Secure Multi-Party Computation",
"Firewall Configuration", "Intrusion Detection Systems", "Virtual Private Networks (VPNs)", "Network Segmentation", "Wireless Network Security", "Network Access Control", "Secure Sockets Layer/Transport Layer Security (SSL/TLS)", "Secure Shell (SSH) Protocol", "Network Monitoring and Analysis", "Denial-of-Service (DoS) Attack Prevention",
"Threat Modeling", "Vulnerability Assessment", "Penetration Testing", "Incident Response", "Malware Analysis", "Phishing Attack Prevention", "Social Engineering Attack Prevention", "Advanced Persistent Threats (APTs)", "Insider Threats", "Cyber Threat Intelligence Sharing",
"Cloud Access Security Broker (CASB)", "Cloud Security Gateways", "Cloud Encryption", "Cloud Identity and Access Management", "Cloud Compliance and Governance", "Cloud Network Security", "Cloud Storage Security", "Cloud Computing Security Standards", "Cloud Security Architecture", "Cloud Security Monitoring",
"AI/ML Model Security", "AI/ML Data Security", "AI/ML Explainability", "AI/ML Transparency", "AI/ML Bias and Fairness", "AI/ML Robustness", "AI/ML Adversarial Attacks", "AI/ML Security Analytics", "AI/ML Incident Response", "AI/ML Security Standards"