The process of converting plaintext into ciphertext.
What is encryption?
This is the brain of the computer.
What is the CPU?
An attack that tricks users into revealing personal information by using fake emails and messages.
What is phishing?
The most common form of authentication.
What is a password?
The unique numerical label assigned to each device on a network.
What is an IP address
A basic type of cipher that replaces each letter with another letter or symbol.
What is a substitution cipher?
This component stores long-term data and files.
What is a hard drive? or SSD
Type of malware that locks files and demands a payment.
What is ransomware?
Authentication requiring users to provide two separate forms of identification.
What is two-factor authentication?
This protocol ensures encrypted communication between your browser and a website, using SSL/TLS.
What is HTTPS?
Cipher that shifts letters of the alphabet by a fixed number.
What is a Caesar Cipher.
Temporary storage for data that is actively being used.
What is RAM?
An attack that tries to guess every possible password.
What is a brute-force attack?
Verifies a user's identity using their unique biological traits such as fingerprints, voices, retinas, and facial features.
What is biometric authentication?
A device that filters and monitors incoming and outgoing traffic on a network.
What is a firewall?
Type of encryption that uses the same key for encryption and decryption.
What is symmetric encryption?
This component connects all the parts together to allow them to function.
What is the Motherboard?
An attack where many sources flood a system with traffic.
What is a DDoS attack?
An electronic document used to prove the validity of a public key.
What is a digital certificate?
The main protocol used to transfer files between computers on a network.
What is File Transfer Protocol (FTP)?
Encryption method that uses two keys (a public one and a private one).
What is asymmetric encryption?
This component supplies power to all the other components.
What is the PSU?
A common attack that uses malicious code to access information that was not intended to be displayed.
A crucial security measure that determines who is allowed to access specific resources, systems, or physical spaces.
What is access control?
What port number is commonly used for secure web traffic.
What is port 443?