1/71
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Encryption
Transforms a message so contents hidden from unauthorized readers.
Plaintext
Original unencrypted message or file; cleartext
Ciphertext
Encrypted message or file.
Decryption
Converts ciphertext back to plaintext.
Cryptographic Algorithm
Procedure for encryption or decryption.
Cryptographic Key
Word/number/phrase required to encrypt or decrypt data.
AES
Advanced Encryption Standard used worldwide.
User Authentication
Technique to verify a person's identity in digital security.
Two-Factor Authentication
Uses two components to verify identity such as password + code.
Authentication - iOS
Short passcodes, long passwords, Face ID, Touch ID.
Authentication - Android
Many settings; does not auto-encrypt without enabling.
Authentication - Windows
Multiple sign-in options via Accounts settings.
Authentication - Mac
Password settings in Security & Privacy; FileVault encrypts data.
Password
Strong passwords are difficult to hack.
Brute Force Attack
Tries every possible combination; can take days.
Dictionary Attack
Steps through word lists to guess common passwords.
Weak Password Characteristics
Dictionary words, doubled words, defaults, dates, usernames, conventional capitalization.
Password Entropy
Measure of password unpredictability in bits.
Password Manager
Keeps track of passwords so user doesn't memorize them.
Strength Meter
Indicates password security.
Malware
Program designed to secretly enter a digital device.
Malware Exploit
action of secretly entering a digital device; 'payload'
Virus
Self-replicating code attaching to legitimate files.
Code Injection
Modifying executables by adding commands.
Side-Loading
Installing apps outside official stores.
Rootkit
Hides processes/privileges; enables root access.
Computer Worm
Sef-replicating program performing unauthorized activity.
Mass-Mailing Worm
Type of worm which spreads by sending itself to every address in the address book of an infected device
internet Worm
Type of worm which looks for vulnerabilities in operating systems/open communication ports/JavaScripts on Web Pages
File-Sharing Worm
Type of worm which copies itself into a shared folder under an innocuous name
Trojan
Program appearing useful while doing hidden malicious actions.
Dropper
Delivers malicious code onto a device.
Antivirus Software
Looks for and eliminates malware.
Virus Signature
Unique code sequence of malware.
Heuristic Analysis
Detects suspicious behavior; may cause false positives.
Online Intrusion
Unauthorized access via internet vulnerabilities.
RAT
Remote Access Trojan creating secret control link with the hacker.
Backdoor
Undocumented method to access device.
Ransomware
Locks device and demands payment.
Botnet
Network of hijacked devices controlled remotely.
DDoS Attack
Overloads services with traffic.
Zero-Day Attack
Exploits unknown software vulnerabilities.
Netstat
Lists open ports for diagnostics.
Firewall
Blocks unauthorized access, allows authorized traffic.
Spyware
Secretly gathers personal information.
Adware
Collects browsing data for targeted ads.
Keylogger
Records keystrokes to steal data.
MITM Attack
Third party intercepts communication.
Evil Twin
Fake Wi-Fi hotspot for interception.
Address Spoofing
Changes address to redirect traffic.
Digital Certificate Hack
Compromises TLS identity verification.
IMSI Catcher
Intercepts mobile signals and location.
IMSI
64-bit number that uniquely identifies a cellular device; International Mobile Subscriber Identity
Social Engineering
Deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest
Advance Fee Fraud
Scam promising money for a small fee.
Spam
Unsolicited mass messages.
CAN-SPAM Act
Anti-spam law passed by the U.S. Congress in 2003; Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003
Phishing
Emails masquerading as authority to steal data.
Spear Phishing
Targeted phishing to specific groups.
Pharming
Redirects traffic to fraudulent sites.
Safe Browsing
Service offered by Google that checks URLs against a list of suscpicious website URLs; used by Chrome, Safari, and Firefox
SmartScreen
Microsoft's version of Safe Browsing.
Rogue Antivirus
Fake virus warnings that install malware.
PUA/PUP
Unwanted apps/programs installed via deception.
Principles of Digital Citizenship
Respect, Educate, Protect in digital spaces.
CIA Triad
Confidentiality, Integrity, Availability.
Deepfakes
AI-generated fake media for scams/fraud.
VPN
Encrypts data and hides network activity.
IoT Security
Change defaults, update firmware, isolate devices.
Digital Minimization
Collect only needed data; delete when unnecessary.
Philippine DPA 2012
Protects privacy; enforced by NPC.
Sensitive Personal Information
SPI includes race, health, IDs, etc.