A method is which computer access is granted only after successfully presenting two or more factors (something the user knows, something the user has, or something the user is.)
What is multifactor authentication?
A type of malicious software, or malware designed to deny access to a computer system or data until compensation is paid.
What is ransomware?
Using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or personal computer.
What is cloud computing?
The process of converting plaintext into another format that can only be un-encoded by a key.
What is encryption
An unsolicited message sent in bulk, also known as junk emails.
What is spam?
An approach to restricting system access to authorized users by granting them access based on their business responsibilities.
What is Role based access control?
An attack that aims to make a service such as a website unusable by flooding it with malicious traffic or data from multiple sources.
What is DDoS or Denial of Service?
The record your browser keeps of the websites you’ve visited, as an aide for easy return.
What is browser history?
A secret word or phrase that must be used to gain access to a computer system or service.
What is password?
Faking the sending address of a transmission in order to gain unauthorized entry into a secure system.
What is spoofing?
A session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications.
What is Single Sign On?
Repeatedly trying all possible combinations of passwords and encryption keys until the correct on is found.
What is a brute-force-attack?
The global, hypermedia-based collection of information and services that is available on internet servers.
What is the World Wide Web?
An appliance used at the perimeter of a network which is designed to block unauthorized access while monitoring and controlling incoming and outgoing network traffic.
What is a Firewall?
A hash of a message that uniquely identifies the sender of the message and proves the message hasn’t changed since transmission.
What is digital signature?
The use of physical characteristics of the users to grant access.
What is biometrics?
A malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.
What is insider threat?
A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server.
What is a cookie?
An application software deployed that is designed to detect and eliminate malicious code or activity including viruses before damage is done and repair or quarantine files that have already been infected.
What is anti-virus?
Sending malicious or fraudulent emails pretending to be from someone else in order to gain access to data, such as personal information and passwords.
What is Phishing?
Controls used to allow as little access as possible to complete a task.
What is least-privilege access?
A confirmed incident in which sensitive, confidential, or protected data has been accessed and/or disclosed in an unauthorized fashion
What is a Data Breach?
Trading in cyberspace, with goods or services supplied through a website.
What is e-commerce?
A set of changes deployed to a computer program or it’s supporting data designed to update, fix, or improve it.
What is a patch?
A targeted attempt to steal sensitive information specifically targeting senior management such as the CEO, CIO, CFO because of their authority and access within the company.
What is whaling?