1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Computing innovation
Any new or existing technology, system, or idea where a computer program is an integral/essential part of its function
Personally Identifiable Information (PHI)
Information about an individual that identifies, links, relates or describes them
Phishing
A cyberattack where attackers trick people into revealing personal information (such as passwords, credit card numbers, or social security numbers) by pretending to be a trusted source, often through emails, texts, or fake websites
Keylogging
The use of software or hardware to secretly record everything a user types on a keyboard, often to steal passwords or personal information
Malware
Software designed to cause harm, spoil things, or spy on them
Rogue Access Point
A fake or unauthorized wireless access point set up to trick users into connecting, allowing attackers to intercept data or personal information
Encryption
The process of converting data into a coded form so that only authorized users with the correct key can read it
Decryption
The process of converting encrypted (coded) data back into its original, readable form using the correct key
Symmetric Key Encryption
An encryption method where the same secret key is used to both encrypt and decrypt data
Public key incription
an encryption method that uses two keys: a public key to encrypt data and a private key to decrypt data
Multi-factor authentication
A security measure that requires users to provide two or more types of verification before accessing an account or system
Computer virus scanning software
Programs that detect, prevent, and remove any malicious software, from a computer system