This acronym stands for information that can be used to identify a specific individual.
What is PII (Personally Identifiable Information)?
This is the most common form of authentication that requires something you know.
What is a username and password?
This type of encryption uses the same key to both encrypt and decrypt data.
What is symmetric encryption?
This type of malicious software replicates itself and spreads to other computers.
What is a virus?
This attack involves sending fraudulent emails that appear to come from reputable sources to steal sensitive information.
What is phishing?
This type of information includes your full name, Social Security number, and home address.
What is personally identifiable information (or PII)?
This security method requires two or more verification factors to gain access to an account.
What is multifactor authentication (MFA) or two-factor authentication (2FA)?
This type of encryption uses two different keys - one public and one private.
What is asymmetric encryption (or public-key encryption)?
This type of malware appears to be legitimate software but contains hidden malicious code.
What is a Trojan horse (or Trojan)?
This social engineering technique involves pretending to be someone else to gain unauthorized access.
What is impersonation?
When companies combine your browsing history, purchase records, and location data, they create this type of comprehensive profile.
What is a detailed digital profile (or data profile)?
This process determines what resources a user can access after they've been authenticated.
What is authorization?
In public-key encryption, this key can be shared openly while the other must be kept secret.
What is the public key?
This malware encrypts your files and demands payment for the decryption key.
What is ransomware?
This attack involves creating fake websites or emails that look identical to legitimate ones.
What is spoofing?
This practice involves websites tracking your online behavior across multiple sites to build advertising profiles.
What is cross-site tracking (or online data collection)?
This is the security practice of tracking and recording user activities on a system.
What is accounting (or auditing)?
This is the main advantage of symmetric encryption over asymmetric encryption.
What is speed (or efficiency)?
This type of software secretly monitors and records your keystrokes.
What is a keylogger?
This social engineering attack involves leaving infected USB drives or other media for victims to find and use.
What is baiting?
These are three examples of data that companies might collect about you without you realizing it.
What are location data, browsing history, search queries, device information, or social media activity? (Accept any three)
These are the three main categories of authentication factors: something you know, something you have, and this.
What is something you are (biometrics)?
This is the main advantage of asymmetric encryption over symmetric encryption.
What is secure key distribution (or not needing to share secret keys)?
These are three preventative measures you can take to protect against malware.
What are antivirus software, keeping software updated, avoiding suspicious downloads, using firewalls, or backing up data? (Accept any three)
This type of false information is deliberately spread to deceive people, often through social media.
What are hoaxes?