cyber security
authentication: a process that identifies the user
Caesar Cypher: a method of encryption in which the letters of the alphabet are shifted by a certain amount of numbers
decryption: the method of translating cypher into plain text
encryption: the process of translating plain text into cypher text so that only authorised users can decrypt it
plain text: a message with no encryption
cypher text: the output when we encrypt plain text
DATA or INFORMATION?
data: raw facts and figures
information: created when data has been processed and has become useful
SOCIAL ENGINEERING
social engineering: the attacks cyber-criminals use to deceive individuals into giving information that can be used for fraudulent purposes
shouldering: an attacker attempting to steal sensitive data by watching the victim while they are displaying sensitive information
name generator attack: attackers in an app or name generator ask victims questions to find out key pieces of information
phishing: where the victim receives an email disguised to look like it came from a reputable source
smishing: where the victim receives a message by SMS disguised to look like it came from a reputable source
blagging: scammer creates a scenario to convince the victim to give data or money