a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
firewall
Use should do this anytime you want to use material created by someone other than you
cite it!
the process of decoding data
decryption
virus
The use of material created by someone else without permission and presented as ones' own
plagiarism
the legal right to reproduce, publish, sell, or distribute matter and form of something
copyright
the most basic authentication measure used to protect your devices and information
strong password
software intended to damage a computing system or to take partial control over its operation
malware
Social Security Number, age, race, phone number are all examples of....
PII: Personally Identifiable Information
a public copyright license that enables the free distribution of an otherwise copyrighted work.
creative commons
computer access control in which the user is only granted access after successfully presenting several separate pieces of evidence to gain access
multifactor authentication
a technique that attempts to trick a user into providing personal information that can then be used to access sensitive online resources
phishing
the process of encoding data to prevent unauthorized access
encryption
programs that are made freely available and may be redistributed and modified
public and private
the use of a program to record every keystroke made by a user in order to gain fraudulent access to passwords and other confidential information
keylogging
material created on a computer that is owned by the creator or an organization
intellectual property
online research output free of any and all restrictions on access and free of many restrictions on use
open access
Public key encryption is used on the open internet and uses 2 keys for encryption making it an example of ____________ encryption
a wireless access point that gives unauthorized access to secure networks
rogue access point