1/35
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Personally Identifiable Information (PII)
any data that can be used to identify, locate, or contact an individual (name, address, SSN, etc.)
Multi-factor authentication
use of several authentication techniques together, such as passwords and security tokens
Password
a word or phrase that you must type for access to an encrypted file or system (ideally letters, numbers, and symbols)
Encryption
process of converting readable data into unreadable characters to prevent unauthorized access
Symmetric Key Encryption
uses the same key for performing the encryption and decryption
Asymmetric Key Encryption
encryption method that uses different keys to encrypt and decrypt the data
Computer Virus
a destructive program that destroys or harms data on a computer
Malware
software designed to infiltrate or damage a computer system without the user's permission
Phishing
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
Keylogging
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
Hacking
invading someone else's computer without the owner's knowledge, usually for personal gain or just for the satisfaction of invading someone else's computer
Biometric Authentication
uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users
Trojan Horse
a program that appears desirable but actually contains something harmful
Worm
a software program capable of reproducing itself that can spread from one computer to the next over a network
Ransomware
a type of malicious software designed to block access to a computer system until a sum of money is paid
Adware
a software program that delivers advertising content in a manner that is unexpected and unwanted by the user
Spyware
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
Spam
unwanted e-mail (usually of a commercial nature sent out in bulk)
DDOS Attack
hacker floods a server with numerous bogus requests through numerous bots so that legitimate users can no longer access the server due to crashes or slower speeds (Distributed Denial of Service)
Rogue Access Points
the attacker sets up an unsecured wireless network near the enterprise with an identical name and intercepts any messages sent by unsuspecting users that log onto it
Virus Protection
preventing a computer virus from infecting a computer by using special software and common sense
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text
Geolocation
the identification of the location of a person or object using technology
Cookies
small computer programs left behind on your computer when you visit a website that track your behavior and transactions
Malicious Link
a link created with the purpose of promoting scams, attacks and frauds
Unsolicited Emails
spam
CIA Triad
defines the target areas when developing a secure system includes confidentiality (limiting authorization to only those with access), integrity (making sure info is accessible and not tampered with), and availability (ensuring those that are allowed to view info can)
Brute Force Attack
an attack on passwords or encryption that tries every possible password or encryption key
Dictionary Attack
a password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file
Freeware
software that is provided without charge
Shareware
copyrighted software that is distributed at no cost for a trial period
Facial Recognition
a biometric method that identifies people based on facial features
Fingerprint Recognition
a type of security that analyzes ridges and valleys (minutiae) on the surface tips of human fingers
Iris Scan Recognition
a biometric identification method that analyzes the unique patterns in a person's iris to identify them
TLS/SSL
Transport Layer Security / Secure Sockets Layer - cryptographic protocols designed for secure communications
Digital Certificate
an electronic document that certifies the identity of the owner of a particular public key and contains that party's public key