The term for sensitive information that includes name, date of birth, and Social Security number.
What is sensitive personal information?
This type of encryption uses the same key to both encrypt and decrypt data.
What is symmetric encryption?
This type of attack involves tricking individuals into revealing sensitive information, such as login credentials or credit card numbers, through deceptive emails, texts, or websites.
What is a phishing attack?
Create an initialism, combine unrelated words together, and use a manager are three recommended strategies for creating and managing these.
What are passwords?
This technology is used to track user behavior on websites by dropping a small piece of code on the user's browser.
What is a tracking website cookie?
The term for information that can be used to indirectly identify an individual, such as age, gender, or occupation.
What is Indirectly Identifiable Information?
The two keys used in asymmetric encryption?
What are public and private keys?
This type of malicious software is designed to replicate itself and spread from one computer to another.
What is a virus?
This type of authentication is based on unique physical or behavioral characteristics of an individual, such as fingerprints or voice patterns.
What is biometric or inherence-based authentication?
These types of cookies are created by a website other than the one you are currently visiting and are often used for tracking user behavior and serving targeted ads.
What is a third-party cookie?
The name of the European legislation designed to protect the privacy of personal information held by organizations.
What is General Data Protection Regulation (GDPR)?
This is the term used to describe the process of decoding encrypted data without having access to the key used to encrypt it.
What is cracking?
This type of self-replicating malware is capable of spreading without any user interaction or intervention by exploiting vulnerabilities in network protocols or operating systems.
What is a worm?
One of the most common pieces of information used for knowledge-based authentication?
What is password, pin, or security questions.
This type of cookie is used by online shopping sites to remember the items in your cart and your login information to improve your shopping experience.
What is a session cookie?
This protocol is used to encrypt data that is transmitted over the internet and is represented by a padlock icon in the browser.
What is HTTPS?
This encryption method is based on mathematical problems that are easy to solve in one direction but difficult to solve in the reverse direction.
What is asymmetric encryption?
Three types of malware that can launch a coordinated attack.
What are trojan horses, viruses, and worms?
This type of authentication requires a physical object, such as a key fob or smart card, to verify the identity of a user.
What is possession-based authentication?
Common technology used to determine the geolocation of a device?
What is GPS?
This protocol is used to provide secure remote access to a private network, often used by companies for employees to work remotely.
What is a virtual private network (VPN)?
This secure internet protocol is used to authenticate clients and servers to ensure that they are who they claim to be.
What is SSL/TLS?
This type of attack involves the creation of a fake wireless access point that is designed to look like a legitimate one in order to steal information from users who connect to it.
What is a rogue access point attack?
This type of authentication requires a user to provide two or more forms of authentication, such as a password and a fingerprint.
What is multi-factor authentication?
The potential risk associated with sharing location data with third-party apps or services.
What is the risk of location tracking and potential invasion of privacy?