Unit 10 CSP Flashcard

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them.

exp. Geolocation, cookies, and browsing history

2
New cards

What are three level of security risks?

Keylogging (level 1)

Phishing (level 2)

Malware (level 3)

3
New cards

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

4
New cards

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

5
New cards

Malware

software intended to damage a computing system or to take partial control over its operation

6
New cards

Equifax Breach

  • Equifax was hacked and the private information of ~143 million people was compromised.

  • private data was stored, but there were no terms of service that users signed allowing that data to be collected.

  • Equifax sells information about private data that individual consumers did not sign terms of service to allow.

7
New cards

Caesar Cipher

  • alphabetic shift

    • -every character was encrypted by substituting it with a character that was some fixed number of letters away in the alphabet.

8
New cards

Substitution Ciphers

  • a method of encryption where each letter (or unit) of plaintext is replaced with another letter (or unit) to create ciphertext

  • give insight into encryption algorithms, but fall short when aided with computational tools.

9
New cards

Symmetric Key Encryption

involves one key for both encryption and decryption.

  • one key that is shared between the encoder and decoder

10
New cards

Public Key Encryption

pairs public key for encryption & private key for decryption. The sender does not need receiver’s private key to encrypt message, but receiver’s private key is required to decrypt the message.

  • encryption uses two keys - a public and a private one.

11
New cards

Multi-factor Authentication

a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.

12
New cards

Computer Virus Scanning Software

: protects a computing system against infection.

13
New cards

Two-Factor Authentication (2FA):

Requires two separate authentication factors

  • Password + one-time code from a mobile app. 

  • Password + SMS code. 

  • Password + email verification

14
New cards

Frequency Analysis

  • key tool for breaking substitution ciphers

  • study frequency of letters of something

15
New cards

Encryption

plain text into cipher text

16
New cards

Decryption

cipher text back into its original plain text

17
New cards

Rogue Access Point

wireless access point that is installed on a secure network without authorization.

  • It can be malicious or simply unauthorized, but either way, it poses a serious security risk to the organization or network.