The practice of tricking people into revealing passwords or sensitive information by pretending to be someone trustworthy.
Phishing
The most common authentication method combining a username with this secret piece of information.
Password
This EU regulation gives citizens control over their personal data and includes the "right to be forgotten."
GDPR (General Data Protection Regulation)
This basic security system filters traffic between networks based on predetermined rules.
Firewall
This feature lets you remotely locate your lost smartphone.
Find My Device/Find My iPhone
The practice of looking through trash to find sensitive information.
Dumpster diving
Using more than one method to verify your identity, like "something you know" plus "something you have."
Multi-factor authentication (MFA)
This is a secure version of HTTP that encrypts data between your browser and a website.
HTTPS
This technology encrypts your internet traffic when using public Wi-Fi.
VPN (Virtual Private Network)
This is the practice of controlling which apps can access your phone's camera, location, or contacts.
Permission management
A technique where an attacker pretends to be someone or something else to gain trust and access, often for malicious purposes.
Spoofing
This authentication method involves scanning your fingerprint, face, or iris.
Biometric authentication
This digital file lets websites store information about you on your device.
Cookie
This wireless security protocol replaced the vulnerable WEP standard.
WPA (Wi-Fi Protected Access)
This verification method confirms app code hasn't been modified since it was published.
Code signing
When someone follows an authorized person through a secure door without using their own credentials.
Tailgating/Piggybacking
This passwordless approach uses your phone to approve login requests.
Push notification authentication
This describes the total amount of information that may be collected about someone across different sources.
Digital footprint
This attack makes a website or service unavailable by flooding it with traffic.
DDoS (Distributed Denial of Service)
A security mechanism for separating running programs, usually in an effort to mitigate system failures and/or software vulnerabilities from spreading.
App sandboxing
The persuasive tactic where individuals are more likely to comply with requests or follow the advice of those perceived as experts or in positions of authority.
Authority principle
This authentication method uses cryptographic keys stored on a physical device you plug into your computer.
Security key/USB token
This type of targeted advertising follows you across different websites based on your browsing history.
Behavioral advertising
This network name is broadcast by wireless access points.
SSID
This vulnerability allows attackers to intercept data by creating fake Wi-Fi networks with familiar names.
Evil twin attack