1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computing information
is any data a computer uses, like text, numbers, or images. It helps with tasks like storing files, sending messages, or making decisions. Example: A phone saving contacts.
PII
personal identificable data, is the data that identifies a person, like a name, address, or social security
Phishing
is a scam where someone tricks you into giving personal information, like passwords or credit card numbers, usually through fake email or websites. Example: A fake bank email asking you to log in
keylogging
is when a program secretly records everything you type, like passwords or messages. Example: A hacker using a keylogger to steal your login info.
Malware
is harmful software that damages or steals data from computers. Example: A virus that deletes files or a spyware that tracks your activity.
Rogue Acess Point
Is an unauthorized WI-Fi hotspot that can steala data or allow hackers into network. Example: a fake public Wi-Fi that captures PAsswords.
Encryption
is the process of converting data into a secret code to prevent unauthorized access.
Decryption
is the process of converting encrypted data into its original form os it can be read.
Symmetric Key Encryption
Uses the same key for both encrypting and decrypting data.
Public key encryption
uses two keys: a public key to encrypt data and a private key to decrypt it