protecting confidential data and information.
Confidentiality
A location where you can change display, screen background, time and many other things
settings app
Default protection for Windows 10 and Windows 11 systems
Microsoft Defender Firewall
involves gathering information about a potential victim.
Reconnaissance
is a set of rules or standards you adopt that dictate how you act. As you work with computers, you will be required to make moral decisions in a variety of situations with many degrees of complexity.
holds all deleted files, allowing you to restore them if you later decide that you shouldn't have deleted them.
Recycle Bin
allows you to view and configure antivirus software.
Virus & threat protection
they are crafted to appear as if they were sent from a legitimate source. The goal is to trick recipients into clicking a link that leads to a fake and malicious website.
Phishing
Computer monitors are made up of tiny _ _ and _ lights
RGB Display
is currently the most widely used operating system on desktop and notebook devices. was released in October 2021
Windows
allows parents to set restrictions to keep their family safe online.
Family Options
use emails to trick the user into providing banking information or sending money to pay fees, and in return, they will receive a much larger amount of money later.
Nigerian scams
In 1959 a new technology allowed an entire computer to be built into a single board, rather than needing large modules for each part of the computer.
Microchip
application allows you to navigate the file system and manage files and folders, including those on optical disks and external drives. It also lets you manage files on the network and to access cloud storage such as Microsoft OneDrive.
File Explorer
allows you to review the most recent actions by antivirus software and any files that were quarantined. If you suspect an application was quarantined by mistake, you can release it from this screen.
Protection history
when an attacker creates a fake scenario to trick the victim into revealing sensitive information.
Pretexting
a way of reducing the size of files, making them easier to store.
Compression
located on the right side of the taskbar. It displays the date and time, network connectivity, and notifications from various applications.
Notification Area
allows you to manage built-in security options. A couple of examples include secure boot and managing a trusted platform module (TPM).
Device Security
involves listening to conversations to obtain sensitive information.
Eavesdropping