1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Revise later
SpaceTo flip
If confident
All Flashcards
What is PII?
Personally Identifiable Information: data that can identify an individual (e.g., age, SSN).
What is Malware?
Malicious software designed to damage or control systems.
What is Phishing?
Tricking users into giving personal info by posing as a trusted entity.
What is Keylogging?
Recording keystrokes to steal sensitive information like passwords.
What are Rogue Access Points?
Unauthorized access points that can intercept data on public networks.
What is Authentication?
Keeping unauthorized users out of your accounts.
What is Multifactor Authentication (MFA)?
Requires multiple verification methods (knowledge, possession, inheritance).
What is Encryption?
Encoding data to prevent unauthorized access. Decryption is decoding.
What are Digital Certificates?
Verify website authenticity.
What are Firewalls?
Monitor traffic and block unsafe websites.
How is data collection used to enhance user experience?
Social media connections, faster product searches.
How is data collection used to power personalized features?
TikTok's For You page.
How can a picture of your view reveal where you live?
Location data or recognizable landmarks in the picture.
How does MFA enhance the security of online banking?
Requires a password and a one-time code sent to your phone, making it harder for hackers to access your account.
How are digital certificates used in e-commerce?
Verify the authenticity of the online store, ensuring secure transactions.
What are the differences between a virus and a worm?
Virus: Attaches to files, needs activation. Worm: Operates independently.
What are the differences between symmetric and public key encryption?
Symmetric: One key for both. Public: Public key to encrypt, private to decrypt.
Compare Knowledge, Possession, and Inheritance verification methods.
Knowledge: Something you know. Possession: Something you have. Inheritance: Something you are.