An act of creating a false document.
Forgery
It allows one to access your information without repercussions.
Consent
It is also considered as Asset.
Information
This is the physical part of the computer
Hardware
It means secret.
Crypt
It is a process of acquiring personal and sensitive information of an individual via email by disguising as a trustworthy entity in an electronic communication.
Phishing
It protects all forms of digital information, including computers, handheld devices, cloud, and networks
Cybersecurity
It refers to the ability to prevent our data from being changed in an unauthorized or undesirable manner.
This is a permanent software etched into the hardware to make it work.
Firmware
A mechanism to prove that the sender really sent this message.
Non-repudiation
It is an attack which proceeds with small increments and final add up to lead to a major attack.
Salami Attack
T or F: Having your birthday as password is safe.
False
It is also what we call unauthorized use.
Piracy
The ultimate goal of this is to make sure the computer won't operate properly
Computer virus
The method by which crypto keys are shared between sender and receiver.
Key exchange
The perpetrator buys a domain in bad faith.
Cyber Squatting
T or F: Compromise of computer security does not cost you anything.
False
This is done when the likelihood of threats/vulnerabilities is high, but their effect is low.
Risk Reduction
This is a program software that can copy itself without human interaction.
Computer worm
It uses mathematical transformation to irreversibly "encrypt" information providing a digital fingerprint.
Hash Functions
The network is choke and often collapsed by flooding it with useless traffic and thus preventing the legitimate network traffic
Denial of Service Attack
This might happen when you let your personal information easily available to anyone.
Identity Theft
If the threats and vulnerabilities are highly likely to occur and the impact is also extremely high
Risk avoidance
A tactic used to reveal your personal information.
Social engineering
ylkrp
BONUS