1/16
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Personally Identifiable Information (PII)
information about an individual that identifies, links, relates, or describes them.
exp. Geolocation, cookies, and browsing history
What are three level of security risks?
Keylogging (level 1)
Phishing (level 2)
Malware (level 3)
Keylogging
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Phishing
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
Malware
software intended to damage a computing system or to take partial control over its operation
Equifax Breach
Equifax was hacked and the private information of ~143 million people was compromised.
private data was stored, but there were no terms of service that users signed allowing that data to be collected.
Equifax sells information about private data that individual consumers did not sign terms of service to allow.
Caesar Cipher
alphabetic shift
-every character was encrypted by substituting it with a character that was some fixed number of letters away in the alphabet.
Substitution Ciphers
a method of encryption where each letter (or unit) of plaintext is replaced with another letter (or unit) to create ciphertext
give insight into encryption algorithms, but fall short when aided with computational tools.
Symmetric Key Encryption
involves one key for both encryption and decryption.
one key that is shared between the encoder and decoder
Public Key Encryption
pairs public key for encryption & private key for decryption. The sender does not need receiver’s private key to encrypt message, but receiver’s private key is required to decrypt the message.
encryption uses two keys - a public and a private one.
Multi-factor Authentication
a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.
Computer Virus Scanning Software
: protects a computing system against infection.
Two-Factor Authentication (2FA):
Requires two separate authentication factors
Password + one-time code from a mobile app.
Password + SMS code.
Password + email verification
Frequency Analysis
key tool for breaking substitution ciphers
study frequency of letters of something
Encryption
plain text into cipher text
Decryption
cipher text back into its original plain text
Rogue Access Point
wireless access point that is installed on a secure network without authorization.
It can be malicious or simply unauthorized, but either way, it poses a serious security risk to the organization or network.