What is the method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system?
Multi-Factor Authentication (MFA)
You bring your laptop to a local restaurant. Without your knowledge, the customer at the table behind you watches you log in to your email, thereby learning your username and password. What is this type of attack called?
Shoulder surfing
This core principle of information security ensures information is not accidentally or maliciously changed.
Integrity
What is the term for harmful software that seeks to damage or exploit the machines that run it?
Malware
This core principle of information security ensures systems, networks and devices needed to protect data are up and running.
Availability
An attacker goes to a local coffee shop and creates a wireless network using the shop's name, hoping unsuspecting customers will log on. What is this type of attack called?
Spoofing
This is the process of evaluating vulnerabilities and threats, identifying countermeasures, and applying mitigating actions to reduce risk to an acceptable level, based on the value of the information.
Risk Management
After clicking an advertisement on an unsecure website, your computer freezes. A message appears, demanding you pay a certain amount of money to unlock your computer. What is this type of attack called?
Ransomware
This core principle of information security ensures information is only available to authorized persons.
Confidentiality
A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information. What is this type of attack called?
Phishing