Cybersecurity Fundamentals: CIA Triad, Authentication, Encryption, Malware & Social Engineering

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Confidentiality

Protecting data from unauthorized access; keeping secrets private. (Breach: Someone reads your private DMs).

2
New cards

Integrity

Ensuring data is accurate and has not been tampered with or changed. (Breach: Someone changes a price or a grade).

3
New cards

Availability

Ensuring systems and data are reliable and accessible when needed. (Breach: An app crashes or a server goes down).

4
New cards

Multifactor Authentication (MFA)

Using at least two different categories of evidence to verify a user's identity.

5
New cards

Knowledge Factor

Something you KNOW (e.g., Password, PIN, Secret Question).

6
New cards

Possession Factor

Something you HAVE (e.g., A smartphone for codes, Steam Guard, or a physical key).

7
New cards

Inherence Factor

Something you ARE (e.g., FaceID, Fingerprint, or Retina scan).

8
New cards

Symmetric Encryption

Uses a single private key for both locking and unlocking; risky because the key must be shared.

9
New cards

Asymmetric Encryption

Uses a Public Key to encrypt and a Private Key to decrypt; much more secure.

10
New cards

SSL (Secure Sockets Layer)

A security protocol shown by a padlock icon in the browser; means the site is following security rules.

11
New cards

Certificate Authorities (CAs)

Trusted organizations that verify the ownership of websites and issue digital security certificates.

12
New cards

Rogue Access Point

An unauthorized Wi-Fi setup that can be used to bypass firewalls and steal data from connected devices.

13
New cards

Malware

Software designed to damage a computer system or take unauthorized control.

14
New cards

Computer Virus

A type of malware that copies itself and spreads by attaching to legitimate programs.

15
New cards

Phishing

Tricking users into giving up personal info through fake emails or websites that look real.

16
New cards

Keylogging

A program that records every single keystroke to steal passwords and login info.

17
New cards

Social Engineering

Using psychological manipulation to trick people into giving away confidential information.

18
New cards

Software Updates

Essential patches that fix 'bugs' or design flaws that hackers use to exploit a system.