1/17
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text
Encryption
a process of encoding messages to keep them secret, so only "authorized" parties can read it
Public Key Encryption
pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
Symmetric Key Encryption
involves one key for both encryption and decryption
Computer Virus Scanning Software
protects a computing system against infection
Multi-factor Authentication
a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
Keylogging
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
Malware
software intended to damage a computing system or to take partial control over its operation
Phishing
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
Rouge Access Point
a wireless access point that gives unauthorized access to secure networks
Deepfakes
Sophisticated audio and video manipulation will enable cybercriminals to impersonate individuals and organizations, leading to social engineering attacks and financial fraud.
AI-Driven Phishing
AI will be used to create highly personalized and targeted phishing campaigns, making them harder to detect.
Ransomware
Ransomware attacks will continue to evolve, with attackers leveraging AI to automate and scale their operations, and focusing on data exfiltration and triple extortion tactics.
Shadow AI
Unsanctioned AI models used by employees without proper governance pose a significant risk to data security.
AI-Generated Documents
Criminals may use AI to create synthetic identities and documents to bypass identity verification processes.
Geopolitical Tensions and Cyber Espionage
Escalating geopolitical tensions could lead to cyberattacks targeting critical infrastructure, including energy grids, water supplies, and transportation networks.
Personally Identifiable Information (PII)
information about an individual that identifies, links, relates, or describes them
Computing Innovation
includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).