the process of converting information or data into a code, especially to prevent unauthorized access
what is encryption
a very well known email company had a cyber attack which affected 500 million users, where hackers stole info. about names, date of births, phone numbers, and passwords.
what is yahoo
found in emails
what is phishing
social media is a hackers favorite target
what is true
this creates a safe secure connection over a less secure network and can restrict certain websites.
what is VPN
a program that tracks and records every keystroke you make on a computer
what is keylogger
the second largest US discount retail chain was a victim of a large-scale cyber attack around black Friday in 2013. banking data of 40 million customers were3 stolen.
what is the 2013 target attack
scammers impersonate honest charities and ask for donations
what are fake charities ( scams )
an IP address is included in URLs
what is false
you are in a coffee shop, using the free wifi, the wifi could possibly access your personal data
another name instead of a person's real name. ( like a user name or handle )
what is a pseudonym
a well-known gaming system that leaked 77 million users data and caused the system to go offline for a while. Hacked by anonymous
what is Sony PlayStation
scammers prey on consumers that are buying or selling services, not every transaction is real.
what is buying and selling scams
money is the main motivation for cyber attacks
a security measure to verify your identity, more than one way.
what is two-factor authentication
a flaw in software and those who are trying to fix it don't know about it.
what is zero-day
one hundred million credit cards were stolen and people feared their accounts would be emptied, which led them to block or deactivate their cards.
what is the south Korean nightmare
scammers take advantage of people looking for romantic partners.
what is online dating scams
the most expensive computer virus of all time cost $38.5 billion dollars.
what is true
creates a barrier between the computer and unauthorized programs trying to come through the internet. It makes you aware if there is any unauthorized use in your system.
what is a firewall
an opponent or enemy trying to prevent you from doing things by eavesdropping changing behavior, or time and storage.
what is adversary malware capability
an American credit company suffered a cyber attack which revealed personal data like names, credit card numbers, and social insurance numbers
what is Equifax
these scams involve offers to work from home or set up and invest in a business opportunity.
what are job and employment scams?
instagram was thought to be hacked in 2017 by a group called anonymous, but in August of 2018 was revealed to have been hacked from an employee.
what is false.
a software installed without your consent that can monitor your online activities and collect personal information while you're online.
what is spyware