unit 8- cyber security and global impacts Flashcards
PII
(Personally Identifiable Information)- information about an individual that identifies, links, relates, or describes them.
Phishing
technique that tricks a user into providing personal information, can then be used to access sensitive online resources, such as bank accounts and emails
keylogging
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
Malware
software intended to damage a computing system or to take partial control over its operation
Rogue Access Point
a wireless access point that gives unauthorized access to secure networks.
Encryption
a process of encoding messages to keep them secret, so only “authorized” parties can read it
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text
Cipher
the generic term for a technique (or algorithm) that performs encryption
Caesar’s Cipher-
a technique for encryption that shifts the alphabet by some number of characters
Cracking encryption
when you attempt to decode a secret message without knowing all the specifics of the ciphers, you are trying to crack the encryption
Symmetric Key Encryption
encrypting data using the same key/code used for both encryption and decryption