Smart devices like thermostats, doorbells, and fridges that connect to the internet are part of this concept.
Internet of things (IoT)
Malicious software designed to harm systems.
Malware
Protocol that encrypts web traffic, preventing attackers from reading data in transit
HTTPS
What does MFA stand for?
Multi-factor authentication
This cipher is named after an ancient Roman Leader that used a simple substitution cipher by shifting letters by 3 positions.
Julius Caesar
What is the difference between HTTP and HTTPS? Explain.
HTTPS is more secure than HTTP because it uses encryption to protect data.
Malware that replicates itself to spread across networks.
Worm
Protocol that secures remote logins with encryption
SSH
Using something you know (password), something you have (phone) and something you are (fingerprint) are examples of different authentication ____?
Factors
This type of encryption uses a public key and private key for encryption and decryption.
Asymmetric Encryption
A network that connects devices within a limited area like a home or school is called ______.
a LAN
Malware disguised as legitimate software.
Trojan horse
Email protocol that is mainly used to send outgoing mail
SMTP
A code sent to your phone after you enter your password is an example of what type of authentication?
Two factor authentication
This French cipher uses a key word to shift letters multiple times, making it much stronger than a Caesar cipher.
Vigenere Cipher
Online gaming lag is often caused by low bandwidth or high ____?
Latency
(Latency = measured how long it takes for data to travel from the source to the destination vs. Bandwidth = the maximum volume of data that can be transmitted over a network per second)
An attack that overwhelms a website with traffic from many computers.
Distributed Denial-of-Service (DDoS) attack
Tunneling protocol used to support connections to VPNs, but does not encrypt data on its own.
L2TP
What is the difference between authentication and authorization?
Authentication verifies who you are. Authorization determines what your are allowed to access
While hashes can be used for security, this simple type of sum is designed only for error detection.
Checksum
When you type a website into your browser, explain the role of DNS and IP addresses in getting you to that site.
DNS translates the domain name into an IP address, and the IP address is used to locate and connect to the correct server.
Malware that secretly records keystrokes to steal sensitive information.
Keylogger
Protocol used primarily in Windows to remotely control another computer via a graphical interface
RDP
An attacker steals a user’s session ID to impersonate them without needing their password. What type of attack is this?
Session hijacking
In symmetric cryptography, the key used by the sender and receiver is ______.
Shared