Personally Identifiable Information (PII)
Information about an individual, such as social security number, age, race, phone number(s), medical information, financial information, and biometric data.
Data breach
The unauthorized access or retrieval of confidential or otherwise protected data.
Cookies
Packets of data stored on a user's device by a website to track visits and activities, facilitating quicker access and better user experience.
Phishing
The practice of sending fraudulent emails that appear to be from legitimate companies to induce individuals to share sensitive information.
Malware
Software intended to damage a computing system or to take partial control over its operation.
Keylogger
A program that records every keystroke made by a user to gain access to passwords and confidential information.
Rogue Access Point
A wireless access point that gives unauthorized access to secure networks.
Private Key Encryption
An encryption method where the sender and receiver share a private key to use in the encryption algorithm.
Symmetric Key Encryption
A process where a single key is used for both the encryption and decryption of data.
Public Key Encryption
A method of paired key encryption where the key to encrypt data is public, while the decryption key is kept secret.
Paired Keys
Two keys that are related so that one encrypts data, which can be decrypted only by the other key.
Asymmetric Encryption
An encryption method that uses a public key and a private key, belonging to one owner.
Certificate Authority
An organization that issues digital certificates verifying the ownership of a public key.
SSL Certificate
A digital document used to verify the authenticity of a server or public key issued by a certificate authority.
Authorization
Permission given to access information.
Authentication
Confirming your identity using knowledge or information only known to you.
Multi-factor Authentication
A method of access control where a user must present multiple pieces of evidence for authentication.
The Digital Divide
The gap between those who have access to computing devices and the internet and those who do not, often based on socioeconomic and demographic factors.
Computing Innovations
Advancements in computing technology that impact how tasks are completed and access to educational and professional opportunities.