CYBR1700 M2B: Personal Cybersecurity

full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

These flashcards cover crucial vocabulary and concepts related to personal cybersecurity and best practices for protecting digital information.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1

Phishing

Sending an email or web announcement falsely claiming to be from a legitimate enterprise to trick users into surrendering private information.

2

Authentication Credential

Information that only the user would know, typically a password.

3

Defensive Stance

A personal security strategy aimed at making it difficult for attackers to compromise safety and privacy.

4

Personal Security Defenses

Strategies to protect personal security, including password protections and social engineering awareness.

5

Two-Factor Authentication (2FA)

A security process that requires two different forms of verification for authentication.

6

Social Engineering

Manipulating individuals into divulging confidential or personal information.

7

Strong Password

A password that is complex, lengthy, and not easily guessed.

8

Password Manager

A program that helps users generate and store complex passwords securely.

9

Nonkeyboard Characters

Special characters that are not typically found on standard keyboards, used to enhance password strength.

10

Identity Theft Prevention

Actions taken to protect personal information and reduce the risk of becoming a victim of identity theft.

11

Financial Monitoring

Regularly reviewing financial statements for any unusual or unauthorized activity.

12

FACTA (Fair and Accurate Credit Transactions Act)

Legislation that allows consumers to access free credit reports and report inaccuracies.

13

Reducing Social Networking Risk

Being cautious about the information shared on social media to avoid privacy invasions.

14

Scam Recognition

The ability to identify misleading or fraudulent offers, often encountered in emails or messages.

15

Anonymous Username

A username that cannot be easily linked to the individual’s real identity.

16

Fictitious Security Answers

Using invented answers for security questions to enhance account security.

17

Strong Password Guidelines

Recommendations for creating secure passwords, such as avoiding personal information and using a variety of character types.

18

Password Length vs. Complexity

The idea that longer passwords significantly increase security compared to a focus solely on complexity.

19

Urgency Manipulation

A tactic used by attackers to create pressure, prompting individuals to act quickly without careful consideration.

20

Secure Action for Social Engineering

Proactive steps taken to verify the authenticity of communications suspected to be fraudulent.

21

Random Number Generator in Password Managers

A feature that creates strong, unique passwords based on user-defined parameters.