Resources

Collegeboard Terms

  • PII: redudant (see 5.3)
  • Multifactor Authentication (MFA) - a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are).
  • Encryption: process of encoding data to prevent unauthorized access
  • Decryption: process of decoding the data. Two common encryption approaches are: symmetric/asymmetric (symmetric = same password used for encryption + decryption)
  • Computer virus: malicious program that can copy itself and gain access to a computer in an unauthorized way
  • Malware: software intended to damage a computing system or to take partial control over its operation
  • Phishing: technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
  • Keylogging: use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  • Rogue Access Point: a wireless access point that gives unauthorized access to secure networks.