CYBR 1700 M2A: Personal Cybersecurity

full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts related to personal cybersecurity, focusing on password security, authentication methods, social engineering, identity theft, and the importance of creating defensive stances to protect personal information.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1

Personal security attacks

Attacks launched against a user’s personal security including password attacks, social engineering, identity theft, and social networking attacks.

2

Authentication

Proof of genuineness confirming a person's identity, often requiring elements such as something you know, something you have, or something you are.

3

Password attacks

Efforts to compromise a user's password through various methods such as brute force attacks, password spraying, or leveraging pre-existing password collections.

4

Social engineering

A manipulation technique that exploits human psychology to gain confidential information or compel actions from individuals.

5

Phishing

A form of social engineering that involves sending fraudulent emails to trick users into revealing personal information.

6

Identity theft

The act of using someone else's personal information without their consent, often for financial gain.

7

Defensive stance

A proactive approach to protect one’s digital life by making it difficult for attackers to compromise safety, financial security, and privacy.

8

Common password vulnerabilities

Weaknesses in passwords that make them easy to guess, such as common words, short lengths, or predictable patterns.

9

Password spraying attack

An attack technique that involves trying a few common passwords against many accounts instead of using multiple passwords on one account.

10

Social networking risks

Dangers associated with the use of social media platforms, including identity theft and unauthorized access to personal information.