Any information about you, including your name, social security number, driver license number, date and place of birth, your mother’s maiden name, and even pictures
What is personally identifiable information (PII)?
This type of attack takes advantage of software vulnerabilities to gain access to resources that normally shouldn’t be accessible (privilege escalation) and modify system files.
What are Rootkits?
A preset network identifier that may or may not be broadcast.
What is a Service Set Identifier (SSID)?
This system uses a set of traffic signatures that match and block malicious traffic and attacks.
What are Intrusion Prevention Systems?
These define the laws that Cybersecurity professionals and individuals must follow.
What are Legal Issues?
A large network of physical objects, such as sensors, software and other equipment.
What are IoT devices?
The most common goal of this is to increase traffic to malicious sites that may host malware or attempt social engineering.
What is Search Engine Optimization poisoning (SEO)?
This organization published improved password requirements that are intended to be used for government applications
Who is the National Institute of Standards and Technologies (NIST)?
In networking, each application running on a device is assigned an identifier called this.
What are Port Numbers?
Moral principles that govern a person's behavior or the conducting of an activity.
What are Ethical Issues?
These are the foundational principles for protecting information.
What are confidentiality, integrity, and availability?
This uses a large dictionary of precomputed hashes and the passwords from which they were calculated to crack passwords.
What is a Rainbow attack?
A Windows system that can be used to encrypt files.
What is the Encrypting File System (EFS)?
Doing this can let you knowing and understanding the value of what you are protecting will help to justify security expenditures.
What are Risk Assessments?
This is an entry-level certification and what you will earn from completing this course.
What is Cisco Certified Support Technician (CCST) Cybersecurity?
This attacker’s job is to identify weaknesses in a company’s computer system.
What is a White Hat Hacker?
This is the process of controlling who does what and ranges from managing physical access to equipment to dictating who has access to a resource, such as a file, and what they can do with it, such as read or change the file.
What are Access Controls?
SDelete, Shred, and Secure Empty Trash are all examples of applications that do this.
What is destroying data by overwriting?
A form of threat detection that involves looking for anomalies in the flow of communication between a user on the local network and a local or remote destination.
What is Behavior-Based Security?
This is the highest professional certification that Mr. Wetzel has.
What is the CompTIA Security+ certification?
This can include confidential documents, trade secrets and patents that an organization or individual holds.
What is Intellectual Property?
This is a multi-phase, long term, stealthy and complex operation against a specific target.
What are Advanced Persistent Threats?
These are the three primary sections of a Terms of Service agreement.
What are Data Use Policy, Privacy Settings, and Security Policy?
Filters communications based on the user, device, role, application type and threat profile (like at school).
What are Context aware layer firewalls?
This is the career in Cybersecurity that Mr. Wetzel will work in (if I ever stop teaching).
What is a Penetration Testers?