Glossary
Authentication
The process of verifying the identity of a user or system to ensure they are who they claim to be.
Example:
When you log into your email, entering your password is part of the authentication process.
Benefits of Data Collection
Advantages gained from gathering and analyzing user information, such as improved user experience or personalized services.
Example:
A streaming service uses data collection to recommend movies you might enjoy, enhancing your viewing experience.
Caesar Cipher
A simple substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.
Example:
If you use a Caesar Cipher with a shift of 3, 'HELLO' becomes 'KHOOR'.
Certificate Authorities (CAs)
Trusted third-party organizations that issue and manage digital certificates, verifying the identity of entities online.
Example:
When you visit a secure website, a Certificate Authority (CA) like Let's Encrypt has issued its digital certificate, confirming its legitimacy.
Data Backups
Copies of data stored in a separate location to protect against data loss due to hardware failure, cyberattacks, or accidental deletion.
Example:
Saving all your important school projects to a cloud service or external hard drive is a form of data backup.
Decryption
The process of converting encrypted, coded information back into its original, readable form using a specific key.
Example:
After receiving an encrypted message, your device performs decryption to reveal the original text.
Device Security
Measures taken to protect physical computing devices and the data they contain from unauthorized access, theft, or damage.
Example:
Using a strong passcode and enabling remote wipe features on your smartphone are aspects of good device security.
Digital Certificates
Electronic documents used to verify the ownership of a public key and confirm the identity of a website or individual.
Example:
The padlock icon in your browser indicates that a website has a valid digital certificate, confirming its identity.
Encryption
The process of transforming information into a secure code to prevent unauthorized access, making it unreadable without the correct key.
Example:
When you send a secure message online, encryption scrambles the text so only the intended recipient can read it.
Firewalls
Network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Example:
A firewall acts like a guard at your computer's gate, blocking suspicious connections from entering or leaving.
French Great Cipher
A complex historical cipher system used by the French, known for its sophisticated substitution and permutation techniques.
Example:
The French Great Cipher was so intricate that it took centuries for parts of it to be fully deciphered.
Harms of Data Collection
Risks associated with gathering and storing user information, including privacy breaches, identity theft, or exploitation.
Example:
A company experiencing a data breach is a significant harm of data collection, as customer information could be exposed.
Inheritance (Verification Category)
A category of authentication factor based on something the user is, typically biometric data like fingerprints, facial scans, or voice recognition.
Example:
Unlocking your phone with your fingerprint uses inheritance as a verification method.
Internet Connection Security
Practices and technologies used to protect data transmitted over the internet, especially on public or unsecured networks.
Example:
Being cautious about using free public Wi-Fi and using a VPN are examples of good internet connection security.
Keylogging
The covert recording of keystrokes made on a keyboard, typically to steal passwords or other sensitive information.
Example:
A hacker might install keylogging software on a public computer to capture usernames and passwords typed by unsuspecting users.
Knowledge (Verification Category)
A category of authentication factor based on something the user knows, such as a password, PIN, or security question answer.
Example:
Your secret answer to a security question like 'What was your first pet's name?' is a form of knowledge verification.
Malware
A broad term for any software designed to disrupt, damage, or gain unauthorized access to a computer system.
Example:
Ransomware, which locks your files until you pay a fee, is a type of malware.
Multifactor Authentication (MFA)
A security system that requires a user to provide two or more verification factors from different categories to gain access.
Example:
Logging into an account that requires both your password and a code sent to your phone uses multifactor authentication (MFA).
Permissions
Controls that determine what actions a user or application is allowed to perform on a system or with specific data.
Example:
When an app asks for permissions to access your camera or location, it's requesting authorization to use those features.
Personal Data
Information about an individual, often collected online, that can reveal aspects of their identity or behavior.
Example:
When you use a fitness app, it collects your daily steps and heart rate as personal data.
Personally Identifiable Information (PII)
Any data that can be used to identify a specific individual, either directly or indirectly.
Example:
Your full name, date of birth, and home address are all examples of personally identifiable information (PII).
Phishing
A deceptive attempt to trick individuals into revealing sensitive information by impersonating a trustworthy entity, often via email.
Example:
Receiving an email that looks like it's from your bank asking for your login details is a classic example of phishing.
Possession (Verification Category)
A category of authentication factor based on something the user has, such as a physical token, smartphone, or smart card.
Example:
Receiving a one-time login code via text message on your phone is an example of possession as a verification factor.
Public Key Encryption
An encryption method that uses a pair of keys: a public key for encryption and a private key for decryption.
Example:
When you send a secure message to a website, you use its public key encryption to scramble the message, and only the website's private key can unscramble it.
Rogue Access Points
An unauthorized wireless access point installed on a network, often by an attacker, to intercept network traffic.
Example:
Connecting to a free Wi-Fi hotspot named 'Free_Public_WiFi' in a coffee shop might actually be a rogue access point set up to steal your data.
Software Updates
Patches or new versions released by software developers to fix bugs, improve performance, and address security vulnerabilities.
Example:
Regularly installing software updates on your phone helps protect it from newly discovered security flaws.
Strong Passwords
Passwords that are difficult to guess or crack, typically long and composed of a mix of uppercase and lowercase letters, numbers, and symbols.
Example:
'MyDogSparky!2025' is a much stronger password than 'sparky123'.
Symmetric Key Encryption
An encryption method where the same secret key is used for both encrypting and decrypting the data.
Example:
Imagine two friends using a shared secret codebook; this is similar to how symmetric key encryption works.
Tracking
The process of monitoring an individual's online activities, location, or behavior, often for targeted advertising or analytics.
Example:
Websites use cookies to enable tracking of your browsing history, allowing them to suggest products you might like.
Trust Model
A framework or system that establishes how trust is managed and verified within a network or security infrastructure, often involving digital certificates.
Example:
Your web browser uses a trust model to decide if a website's digital certificate is valid and safe to connect to.
Virus and Malware Scanning Software
Programs designed to detect, prevent, and remove malicious software from a computer system.
Example:
Running virus and malware scanning software like Windows Defender helps keep your computer free from harmful programs.
Viruses
Malicious software that attaches itself to legitimate programs and requires user action to spread and activate.
Example:
An email attachment containing a virus might infect your computer only after you click to open it.
Worms
Self-replicating malicious software that can spread independently across networks without requiring user interaction.
Example:
A worm could spread rapidly through a company's network, infecting multiple computers without anyone clicking a link.