An identifier that uniquely tracks actions to individuals.
What is a User ID? (or Login ID)
The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
What is Social Engineering?
This concept refers to the assurance that information and resources are accessible to authorized users when needed, often measured by uptime percentages in IT environments.
What is "availability"?
This protocol, commonly used for transmitting web pages securely, operates over port 443 and is essential for transferring hypertext documents across the World Wide Web
What is "HTTPS"?
This term describes the practice of disguising malicious code as legitimate software, often tricking users into downloading it.
What is "Trojan horse"?
This strategy involves creating duplicate copies of data and systems to ensure access and functionality can be quickly restored in the event of a failure or disaster.
What is "disaster recovery"?
This type of attack involves overwhelming a server with traffic from multiple sources, rendering it unable to respond to legitimate requests.
What is a "DDoS attack" (Distributed Denial of Service)?
This legal framework aims to enhance data protection and privacy for individuals within the European Union and the European Economic Area.
What is the "General Data Protection Regulation" (GDPR)?
This type of security measure involves the use of barriers, such as fences, walls, and gates, to protect a facility from unauthorized access and to deter potential intruders.
What is "perimeter security"?
This concept refers to the interconnection of everyday devices to the internet, allowing them to send and receive data.
What is "Internet of Things"?