This is a type of malware that replicates itself in order to spread from one computer to another.
Worms
This vulnerability describes a situation where the output of an event depends on ordered or timed outputs
Race Condition
the process of converting information into a form in which unauthorized parties cannot read it.
Encryption
the manipulation of people into performing actions or divulging confidential information
Social engineering
You should use at least one type, to protect your device from unauthorized access on a router.
software firewall or a hardware firewall
This type of malware is used to gain unauthorized access by bypassing the normal authentication procedures to access a system.
Backdoor
A vulnerability occurs when data is written beyond the limits
Buffer Overflow
may prevent the loss of irreplaceable data
Having a backup
This technique attempts to gain access to a system by using a few commonly used passwords across a large number of accounts
Password Spraying
All of your computing devices, including PCs, laptops, tablets and smartphones, should be?
password protected
Designed to track and spy on you
Spyware
an emerging threat that hides on a user’s computer, mobile phone, tablet, laptop or server, using that machine’s resources to 'mine’
Cryptojacking
A legally binding contract that governs the rules of the relationship between you, the service provider and others who use the service
Terms of Service agreement.
Goal to increase traffic to malicious sites that may host malware.
SEO poisoning
this should not be considered adequate security for a wireless network.
don't broadcast the SSID
Malware that holds a computer system captive until a payment is made to the attacker
Ransomware
Usually introduced by errors in the operating system or application code.
Software vulnerabilities
This is an entry-level security certification that meets the U.S. Department of Defense Directive 8570.01
CompTIA Security+
On your way into the office, a person whom you have never seen before asks you to hold the door — they forgot their access card
Social engineering
This service gives you secure access to the Internet
VPN
Regardless of the type of malware a system has been infected with, there are some common symptoms to look out for.
-An increase in CPU usage
-Freezing or crashing
- Decrease in Speed
-Problems with network connection
-Deleted files
Two hardware vulnerabilities that affect almost all central processing units (CPUs) released since 1995 within desktops, laptops, servers, smartphones, smart devices and cloud services.
Meltdown and Spector
refers to behavior or actions that go against established moral principles
Unethical
a multi-phase, long term, stealthy and advanced operation against a specific target
advanced persistent threats
these guidelines aim to place responsibility for user verification on service providers and ensure a better experience for users overall.
Password Guidelines