1/20
These flashcards cover crucial vocabulary and concepts related to personal cybersecurity and best practices for protecting digital information.
Name  | Mastery  | Learn  | Test  | Matching  | Spaced  | 
|---|
No study sessions yet.
Phishing
Sending an email or web announcement falsely claiming to be from a legitimate enterprise to trick users into surrendering private information.
Authentication Credential
Information that only the user would know, typically a password.
Defensive Stance
A personal security strategy aimed at making it difficult for attackers to compromise safety and privacy.
Personal Security Defenses
Strategies to protect personal security, including password protections and social engineering awareness.
Two-Factor Authentication (2FA)
A security process that requires two different forms of verification for authentication.
Social Engineering
Manipulating individuals into divulging confidential or personal information.
Strong Password
A password that is complex, lengthy, and not easily guessed.
Password Manager
A program that helps users generate and store complex passwords securely.
Nonkeyboard Characters
Special characters that are not typically found on standard keyboards, used to enhance password strength.
Identity Theft Prevention
Actions taken to protect personal information and reduce the risk of becoming a victim of identity theft.
Financial Monitoring
Regularly reviewing financial statements for any unusual or unauthorized activity.
FACTA (Fair and Accurate Credit Transactions Act)
Legislation that allows consumers to access free credit reports and report inaccuracies.
Reducing Social Networking Risk
Being cautious about the information shared on social media to avoid privacy invasions.
Scam Recognition
The ability to identify misleading or fraudulent offers, often encountered in emails or messages.
Anonymous Username
A username that cannot be easily linked to the individual’s real identity.
Fictitious Security Answers
Using invented answers for security questions to enhance account security.
Strong Password Guidelines
Recommendations for creating secure passwords, such as avoiding personal information and using a variety of character types.
Password Length vs. Complexity
The idea that longer passwords significantly increase security compared to a focus solely on complexity.
Urgency Manipulation
A tactic used by attackers to create pressure, prompting individuals to act quickly without careful consideration.
Secure Action for Social Engineering
Proactive steps taken to verify the authenticity of communications suspected to be fraudulent.
Random Number Generator in Password Managers
A feature that creates strong, unique passwords based on user-defined parameters.