1/35
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Personally Identifiable Information (PII)
information about an individual that identifies, links, relates, or describes them. (address, bank info, mother's maiden name)
Symmetric Key Encryption
involves one key for both encryption and decryption. Because one key is used, and is sent back and forth, when you send the key you are simultaneously encrypting the key itself.
Phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information (text, call, email)
Trojan Horse
a program that appears desirable but actually contains something harmful, such as malware, or a virus.
Spyware
A type of Malware that locates and saves data from users without them knowing about it, sells data to advertisments.
Virus Protection
Preventing a computer virus from infecting a computer by using special software and common sense.
Malicious Link
A link on a page or website that may appear desirable or safe, but contains malware that may harm the user.
Dictionary Attack
A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.
Fingerprint Recognition
A type of security ant authorization by using the user's fingerprint to confirm who is attempting to access hardware or a program.
Multi-factor authentication
Having multiple layers to protect and secure a program, or something that is secure (at least 2 ways)
Asymmetric Key Encryption
Encryption that uses two keys, public and private, to protect and encrypt that data.
Keylogging
Use of a program that record every keystroke, can be used to access unauthorized information from the user.
Worm
A destructive computer program that can spread out across a network rapidly, replicating itself.
Spam
Unwanted e-mail or messages that are normally sent in bulk not directed towards specific users.
Decryption
Process of reversing encryption, going through protected data and unraveling whatever is being hidden.
Unsolicited Emails
Unwanted e-mails that are normally sent in mass amounts (like spam) and are received by random users.
Freeware
(Malicious links/downloads)
Software that is accessible with little to no cost at all, can hide possible malicious links or downloads if the user isn't aware.
Iris Scan Recognition
Biometric technology that identifies individuals by analyzing and saving images of their eyes.
Password
A word or phrase that a user can create to encrypt their personal information. (number, letters, symbols)
Computer Virus
An unwanted software program that has the capability of attacking the network to which it is given access.
Malware
Malicious software that is intended to damage or disable computers and computer systems. (Virus, phishing, adware, trojan horse)
Biometric Authentication
Uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users.
Adware
A program that displays advertisements for a specific site or page for revenue, unwanted, possibly malicious.
Ransomware
a type of malicious software designed to block access to a computer system until a sum of money is paid.
Hacking
invading someone else's computer, usually for personal gain or just for the satisfaction of invading someone else's computer
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
DDOS Attack
Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.
Rogue Access Points
Unauthorized wireless network access device.
Geolocation
The identification of the location of a person or object using technology.
Cookies
a computer program, installed on hard drives, that provides identifying information from a website or page accessed.
CIA Triad
Confidentiality (limiting access to info to those who are authorized) Integrity (making sure information is correct) Availability (ensuring people who are authorized can access)
Brute Force Attack
An attack on passwords or encryption that tries every possible password or encryption key. Bots are normally used for thousands of attempts per hour.
Shareware
(Malicious links/downloads)
Software that is accessible with a trial normally before paying, can be used to trick unknowing users to install or pay for unwanted malware.
Facial Recognition
A biometric technology that looks for unique measurements in an individual's face.
TLS/SSL *
One was the predecessor to the other: Both were used to encrypt information and data on the internet that is sent throughout the web/
Digital Certificate *
Limited use Certificate given that guarantees a website is available to use