Pretending to be something or someone other than yourself.
Spoofing
Public Wi-Fi is risky. A hacker on the same network could intercept your data. You should avoid accessing sensitive information, like banking, on public Wi-Fi or use a VPN.
Is using public Wi-Fi safe?
What is the terminology used for secure network user habits?
Cyber hygiene
What is an example of good network user habits?
What is an example of good network user habits?
A nontechnical or low technology confidence trick often involving trickery or fraud.
Social Engineering
A strong passcode, PIN, or fingerprint/face unlock prevents unauthorized access to your device, protecting your personal data if it's lost or stolen.
Why should I use a strong passcode or biometric lock?
Before a user connects to a network they need to supply what before the connection is allowed?
Valid Credentials
What should be done in server rooms to physically protect servers?
Controlled access (Done to prevent theft)
Offering something enticing, like a free download, to lure you into clicking a malicious link or downloading malware
Baiting
Where is the biometric data for an Android facial recognition lock or fingerprint lock kept?
Only on the Android device
For authentication factors what would fall under the category for something you have?
Physical tokens or codes sent via text
Network administrators will help secure a network by implementing what on files and folders?
Permissions (falls under access control lists)
An attack against a specific individual that utilizes messaging that appeals to that person.
Spear Phishing
When you connect your phone to a computer it can be a risk, as malicious software could be transferred to your device.
What can happen when connecting my phone to a computer via USB?
If an account is compromised by utilizing this option a hacker can now access multiple systems.
Single Sign On (SSO)
By granting either either physical or virtual access to an organization's information system can leave them what?
Vulnerable to exploitation or carelessness.