A
B
C
D
E
100

Info that can be used on its own or with other info to identify, contact, or locate an individual
social security numbers, address, birth dates, names, phone numbers, passwords, username, family names, pet names, account numbers, pictures, school info

Personal Identifiable Information (PII)

100

any info from a medical record obtained during a medical appointment that can be used to identify you

Protected Health Information (PHI)

100

They are your first line defense again web attacks, use should be strong and secure

Passwords

100

short for malicious software, any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising

Malware (Malicious Software

100

Location is tagged on them and can provide information as to where you were/are.

pictures

200

made up of a combination of LOWERCASE LETTERS, UPPERCASE LETTERS, SYMBOLS and NUMBERS and 8 characters or more in length

Secure Passwords

200

It has "https", and it has a lock showing on the URL

secure website

200

online storage that allows us to access our file/folders anywhere with an internet connection

cloud storage

200

Functions by spying on user activity without their knowledge. Captures your keystrokes so it knows what your typing and what sites you're accessing

Spyware

200

Holds a computer system captive while demanding a payment

Crimeware/Ransomware

300

a software application that stores and organizes encrypted passwords can also provide passwords for a user and is accessed using a single, strong master password

Password manager

300

use their talent for good rather than bad, hired by companies as security specialists, ethical hackers

White Hat Hackers

300

Disguises itself as a normal file or program to trick users into downloading and installing malware

Trojans

300

Automatically delivers unwanted advertisements

Adware

300

use their talent for good rather than bad, hired by companies as security specialists, ethical hackers

Black Hat Hackers

400

you take a phrase, then use the first letter of each word, add the website you're creating the account for, substitute in special characters and numbers

Passphrase 

400

A form of digital currency, It is not an official currency, however, which means that it operates without the involvement of banks or clearinghouse. There is no control over it.

Bitcoin

400

Requires an active host program or an already-infected and active operating system

Virus

400

Stand-alone malicious programs that can multiply and spread via computer networks

Worms

400

they are not trying to cause problems or exploit vulnerabilities, but they do access networks and computers without owners permission and will usually let owners know of problems

Grey Hat Hackers

500

Web address

Uniform Resource Locator (URL)

500

All the devices that are connected to the internet.  By the year 2020, it is predicted that more than 50 billion connected devices will be on the Internet.

Internet of Everything

500

scams that try to trick you into providing private information like a password, or account number, or bank and credit card information

Phishing

500

Designed to remotely access or control a computer without being detected

Rootkit

500

Bitcoin is a type of this

Cryptocurrency

M
e
n
u