The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
What is Cybersecurity?
Helps you generate, store and manage strong, unique passwords securely.
What is a password manager?
Encryption supports this by verifying the identity of users and devices.
What is authentication?
The ability to understand and recognize threats that exist on the internet, as well as having the skills and knowledge to avoid these threats.
What is online safety?
Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems.
What are cybersecurity threats?
Regularly updating your operating systems, software, and applications to patch vulnerabilities.
What is keeping software updated?
What is network security?
Being careful about sharing information such as: full name, address, social security number
What is securing personal information?
The process of converting data into a more unreadable format, using a secret key, making it secure and accessible only to authorized parties with the corresponding decryption key.
What is encryption?
Not clicking links or opening attachments in emails from people you do not know and avoiding the download of software or files from unknown sources.
What is protecting against malware?
A malicious actor gaining access to an unsuspecting user's data, including sensitive information such as passwords and payment details.
What is spyware?
A security measure that requires users to provide two or more verification factors beyond just a password to access a system or application, significantly enhancing security.
What is Multi-Factor Authentication (MFA)?
The secure version of HTTP, ensuring encrypted communication between a user's browser and a website, protecting sensitive data from eavesdropping and tampering.
What is Hypertext Transfer Protocol Secure (HTTPS)?
How an organization responds to a cyber-security incident or any other event that causes the loss of operations or data.
What is Disaster recovery and business continuity?
Intercepting the communication between two endpoints, such as a user and an application.
What is a Man in the Middle (MitM) attack?