cyber security

authentication: a process that identifies the user

Caesar Cypher: a method of encryption in which the letters of the alphabet are shifted by a certain amount of numbers

decryption: the method of translating cypher into plain text

encryption: the process of translating plain text into cypher text so that only authorised users can decrypt it

plain text: a message with no encryption

cypher text: the output when we encrypt plain text

DATA or INFORMATION?

data: raw facts and figures

information: created when data has been processed and has become useful

SOCIAL ENGINEERING

social engineering: the attacks cyber-criminals use to deceive individuals into giving information that can be used for fraudulent purposes

shouldering: an attacker attempting to steal sensitive data by watching the victim while they are displaying sensitive information

name generator attack: attackers in an app or name generator ask victims questions to find out key pieces of information

phishing: where the victim receives an email disguised to look like it came from a reputable source

smishing: where the victim receives a message by SMS disguised to look like it came from a reputable source

blagging: scammer creates a scenario to convince the victim to give data or money