This is the process of verifying the identity of a user before granting access to a system.
What is authentication?
This is a type of software designed to protect against viruses and malware.
What is antivirus software?
This is the physical and virtual resources that support the flow, storage, processing, and analysis of data.
What is IT infrastructure?
This is the practice of protecting personal information from unauthorized access and use.
What is data privacy?
This is the basic unit of data transmitted over a network.
What is a packet?
This is the principle of granting users only the access necessary to perform their job functions.
What is the principle of least privilege?
This is the practice of protecting systems, networks, and programs from digital attacks.
What is cybersecurity?
This is a network of remote servers hosted on the internet to store, manage, and process data.
What is cloud computing?
This is a regulation in the EU that governs data protection and privacy.
What is the General Data Protection Regulation (GDPR)?
This is a unique address assigned to each device connected to a network.
What is an IP address?
This is a common protocol used for single sign-on (SSO) in identity management.
What is SAML (Security Assertion Markup Language)?
This is a type of attack where an unauthorized person gains access to a network by pretending to be a trusted user.
What is phishing?
This is a type of network that connects computers within a limited area, such as a building.
What is a Local Area Network (LAN)?
This is the process of converting data into a code to prevent unauthorized access.
What is encryption?
This is a protocol used for sending email messages between servers.
What is SMTP (Simple Mail Transfer Protocol)?
This is the process of managing and maintaining user identities and their access rights across systems.
What is identity lifecycle management?
This is a security measure that requires two forms of identification before granting access.
What is two-factor authentication (2FA)?
This is a device that forwards data packets between computer networks.
What is a router?
This is a principle that requires organizations to collect only the data necessary for a specific purpose.
What is data minimization?
This is a network security system that monitors and controls incoming and outgoing network traffic.
What is a firewall?
is is a framework for managing digital identities and access rights in a secure and efficient manner.
What is Identity and Access Management (IAM)?
This is a type of malware that encrypts a user's files and demands payment for the decryption key.
What is ransomware?
This is a model for delivering IT services where resources are retrieved from the internet through web-based tools.
What is Software as a Service (SaaS)?
This is a legal framework that sets guidelines for the collection and processing of personal information.
What is a data protection policy?
This is a protocol used to securely access a remote computer over a network.
What is SSH (Secure Shell)?