unit 8

Cards (11)

  • Personally Identifiable Information (PII) information about an individual that identifies, links, relates, or describes them
  • Phishing: a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
  • Keylogging: the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  • Malware: software intended to damage a computing system or to take partial control over its operation
  • Roude access point: a wireless access point that gives unauthorized access to secure networks
  • Encryption: a process of encoding messages to keep them a secret, so only "authorized" parties can read it
  • Decryption: a process that reverses encryption, taking a secret message and reproducing the original plain text
  • Symmetric Key encryption: involves on key for encryption and decrpytion
  • Public key encryption: pairs a public key for encryption and a private key for decryption. The sender does not need the receivers private key to encrypt a message, bu the receiver's private key is required to decrypt the message
  • Multifactor Authentication: a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know,) possession (something they have), and inherence (something they are). Each step provides a new layer of security
  • Computer Virus scanning software: protects a computing system against infection