CYBR1700 M2B: Personal Cybersecurity

call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

These flashcards cover crucial vocabulary and concepts related to personal cybersecurity and best practices for protecting digital information.

Last updated 6:53 PM on 10/30/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai
Add student to class section state
Add studentsNo students in these sections. Invite them to track progress!

21 Terms

1
New cards

Phishing

Sending an email or web announcement falsely claiming to be from a legitimate enterprise to trick users into surrendering private information.

2
New cards

Authentication Credential

Information that only the user would know, typically a password.

3
New cards

Defensive Stance

A personal security strategy aimed at making it difficult for attackers to compromise safety and privacy.

4
New cards

Personal Security Defenses

Strategies to protect personal security, including password protections and social engineering awareness.

5
New cards

Two-Factor Authentication (2FA)

A security process that requires two different forms of verification for authentication.

6
New cards

Social Engineering

Manipulating individuals into divulging confidential or personal information.

7
New cards

Strong Password

A password that is complex, lengthy, and not easily guessed.

8
New cards

Password Manager

A program that helps users generate and store complex passwords securely.

9
New cards

Nonkeyboard Characters

Special characters that are not typically found on standard keyboards, used to enhance password strength.

10
New cards

Identity Theft Prevention

Actions taken to protect personal information and reduce the risk of becoming a victim of identity theft.

11
New cards

Financial Monitoring

Regularly reviewing financial statements for any unusual or unauthorized activity.

12
New cards

FACTA (Fair and Accurate Credit Transactions Act)

Legislation that allows consumers to access free credit reports and report inaccuracies.

13
New cards

Reducing Social Networking Risk

Being cautious about the information shared on social media to avoid privacy invasions.

14
New cards

Scam Recognition

The ability to identify misleading or fraudulent offers, often encountered in emails or messages.

15
New cards

Anonymous Username

A username that cannot be easily linked to the individual’s real identity.

16
New cards

Fictitious Security Answers

Using invented answers for security questions to enhance account security.

17
New cards

Strong Password Guidelines

Recommendations for creating secure passwords, such as avoiding personal information and using a variety of character types.

18
New cards

Password Length vs. Complexity

The idea that longer passwords significantly increase security compared to a focus solely on complexity.

19
New cards

Urgency Manipulation

A tactic used by attackers to create pressure, prompting individuals to act quickly without careful consideration.

20
New cards

Secure Action for Social Engineering

Proactive steps taken to verify the authenticity of communications suspected to be fraudulent.

21
New cards

Random Number Generator in Password Managers

A feature that creates strong, unique passwords based on user-defined parameters.

Explore top flashcards