Chapter 5_Digital Security, Ethics, and Privacy Part II

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Authentication

The process of verifying users' legitimacy to access resources.

2
New cards

Strong Passwords

Passwords that are long, complex, and difficult to memorize but vital for secure authentication.

3
New cards

Weak Password

Passwords that are predictable, short, or based on common words and personal information, providing minimal security.

4
New cards

Biometric Security

Authentication methods based on unique personal characteristics, such as fingerprints, facial recognition, or iris scans.

5
New cards

Two-Factor Authentication (2FA)

An authentication method that requires two different types of information to verify a user's identity.

6
New cards

CAPTCHA

A test used to differentiate between humans and automated systems by requiring users to identify distorted letters or images.

7
New cards

Password Manager

A software application designed to store and manage passwords securely.

8
New cards

Disaster Recovery Plan

A written strategy to restore computer operations following a disaster.

9
New cards

Natural Disasters

Unpredictable events like earthquakes and floods that can affect computer operations.

10
New cards

Man-Made Disasters

Disasters resulting from human actions, such as hacking or malware attacks.