Criminal Activities :)
Virtual "tunnel" used for encrypted traffic.
What is a VPN?
The best way to make passwords.
What is long and unpredictable?
An attack where the attacker spies on the user.
What is spyware?
The worst form of "security".
What is security by obscurity?
A trace of your online activity.
What is a digital footprint?
What is self-hosted/third-party?
Hosting services on your own computer.
What is self-hosted?
An attack where an attacker uses the compute power of the computer for mining cryptocurrency.
What is crypto-jacking?
Meant to deter attackers.
Tradeoff often in security.
What is the convenience vs. security tradeoff?
A way to separate links between accounts.
What is compartmentalizing emails?
An attack whereby the attacker holds your data behind an encryption key and asks for money to get your data back.
What is ransomware?
High level leadership/management, people who deal with valuable/confidential information daily.
Who is at a higher risk?
The main internet protocol used on the internet.
What is HTTP (Hypertext Transfer Protocol)?
Self-hosted VPN
What is WireGuard?
Refers to disconnecting a computer from any network.
What is air-gapping?
What is spear-phishing?
Threat source such as a disgruntled employee.
What is an internal threat?
A language used for querying databases.
What is SQL?
The internet protocol used for browsing while remaining anonymous.
What is Tor?
The three components to multi-factor authentication.
What is "Who you are", "What you know", "What you have"?
An attack where the attacker repeatedly sends invalid requests in order to overwhelm the host.
What is DDoS?
Mentality for delegating security.
Least-Privilege Access
Cryptographic signing scheme.
ED25519, ECDSA, RSA, DSA