Cyber security

Flash Card Quiz

  1. Personal Information Protection:

    • Personal Info: Identifying details like SSN, DL, birthday, job title.

    • Encryption: Converts data into unreadable form for authorized access.

    • Two-Factor Authentication (2FA): Requires two verifications for access.

    • Password Strength: Measure of password complexity.

    • Password Manager: Securely stores and manages passwords.

    • Biometrics: Uses unique physical traits for authentication.

    • Multi-Factor Authentication (MFA): Requires multiple verification methods.

    • Zero-Trust Security: Assumes no inherent trustworthiness.

    • Data Loss Prevention (DLP): Prevents unauthorized access to sensitive data.

    • Symmetric Encryption: Uses the same key for encryption and decryption.

    • Asymmetric Encryption: Uses public and private keys for encryption and decryption.

    • Steganography: Conceals information within another file.