Info that can be used on its own or with other info to identify, contact, or locate an individual
social security numbers, address, birth dates, names, phone numbers, passwords, username, family names, pet names, account numbers, pictures, school info
Personal Identifiable Information (PII)
any info from a medical record obtained during a medical appointment that can be used to identify you
Protected Health Information (PHI)
They are your first line defense again web attacks, use should be strong and secure
Passwords
short for malicious software, any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising
Malware (Malicious Software
Location is tagged on them and can provide information as to where you were/are.
pictures
made up of a combination of LOWERCASE LETTERS, UPPERCASE LETTERS, SYMBOLS and NUMBERS and 8 characters or more in length
Secure Passwords
It has "https", and it has a lock showing on the URL
secure website
online storage that allows us to access our file/folders anywhere with an internet connection
cloud storage
Functions by spying on user activity without their knowledge. Captures your keystrokes so it knows what your typing and what sites you're accessing
Spyware
Holds a computer system captive while demanding a payment
Crimeware/Ransomware
a software application that stores and organizes encrypted passwords can also provide passwords for a user and is accessed using a single, strong master password
Password manager
use their talent for good rather than bad, hired by companies as security specialists, ethical hackers
White Hat Hackers
Disguises itself as a normal file or program to trick users into downloading and installing malware
Trojans
Automatically delivers unwanted advertisements
Adware
use their talent for good rather than bad, hired by companies as security specialists, ethical hackers
Black Hat Hackers
you take a phrase, then use the first letter of each word, add the website you're creating the account for, substitute in special characters and numbers
Passphrase
A form of digital currency, It is not an official currency, however, which means that it operates without the involvement of banks or clearinghouse. There is no control over it.
Bitcoin
Requires an active host program or an already-infected and active operating system
Virus
Stand-alone malicious programs that can multiply and spread via computer networks
Worms
they are not trying to cause problems or exploit vulnerabilities, but they do access networks and computers without owners permission and will usually let owners know of problems
Grey Hat Hackers
Web address
Uniform Resource Locator (URL)
All the devices that are connected to the internet. By the year 2020, it is predicted that more than 50 billion connected devices will be on the Internet.
Internet of Everything
scams that try to trick you into providing private information like a password, or account number, or bank and credit card information
Phishing
Designed to remotely access or control a computer without being detected
Rootkit
Bitcoin is a type of this
Cryptocurrency