is for Authentification:
The process of proving a person is who they say they are. Authentication can happen by having the person provide one of the following:
- Something they know (like a password or security question)
- Something they are (a biometric measure like a fingerprint or face scan)
- Something you have (like a token or authenticator app on a phone) By Miguel A. SP
is for
Blacklist, biometric validation.
The blacklist is a list where we write directions, internet ports, emails, nickname of users that we
think are malicious for our integrity in the digital world. Otherwise, the white list, is a list where we
write secure directions, nicks, emails and more.
Biometric validation is a method of authentification with parts of our body, for example the eyes,
the mouth, fingerprint or our voice. By Heri SP
is for C in CyberSecurity is for Cryptography. Cryptography is a method of protection used to save
communications and information using different codes. By William SP
is for
By Alex GR
is for An Ethical hacker is an authorized person who gets authorized access to a computersystem, application, or data.Carrying out an ethical hack that involves duplicating astrategy or an action to take over the malicious hacker. This helps to identify the securityvulnerabilities which can be resolved before a malicious hacker has the opportunity toexploit it. By Yoel SP
and Alex GR
is for F Firewall: A firewall is a network security device that monitors incoming and outgoing traffic and decides whether to allow or block specific traffic based on a set of already defined security restrictions. By Inés SP and Alex GR
is for 'Greylisting'. This is a method used for protecting e-mail users from spam. It consists of
blocking a suspicious email from unknown senders with a temporary error. This method tries to
efficiently filter out the majority of spam while allowing valid mails to go through your inbox. By Andrea A. SP
is for HACKER
Hacker is a person who is highly skilled computer programmer that locates security gaps and accesses secure systems via unique analytical skills. By Sara SP
is for IP (Internet Protocol): IP adress is a unique identifier assigned to Internet-connected devices such as mobile phones, PC's, tablets or laptops. Each device has its own IP adress composed by a string of numbers in order to be able to access to the Internet. However, you have to be careful, because IP has all the information of the device they are linked to and, if someone finds yours, they will be able to see the personal information you have in that device as well.
By Alba SP
is for "Javascript", which is programming language where you can create apps that can help developers. and computer scientists on their tasks. By Hugo SP
is for K is for Kali Linux - Is a Linux distribution designed for digital forensics and penetration testing. It
is maintained and funded by Offensive Security. Kali Linux is based on the Debian Testing branch:
most packages Kali uses are imported from the Debian repositories. By Carlos SP
is for login in computer security , "log in" or "log on" is the process , control the individual access for an informatics system with the identification form of username and a password and it uses credentials. By Adrián Ab SP
is for Management - You should manage your passwords and e-mails.
- Don't use the same passwords. Use different ones for each web.
- Write them on a notebook to remember them.
- Change them at least each 3 or 4 years. It is better to change your password regularly.
By Aitor SP
is for N is for : NSA; Stands for the National Security Agency and is the official United States
cryptologic organization under the Departament of Justice. Responsible for global
monitoring, collection, and processing of information and data for both foreign and domestic
intelligence. By Adrián A. SP
is for open source: Software that has their code listed as free to use,
share, and modify.
It is very secure because it is free so there is no problem if you use it. By Claudia SP
for Password: a secret word or phrase that is used to access a computer system or service.
A password is one of the most important terms of cybersecurity, the word that you choose will protect all your data of an bank account or something like that.
A secure password must have at least a capital letter, a lower case and a symbol.
Phising: the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
IES Paco
- Full access to our public library
- Save favorite books
- Interact with authors
is for Authentification:
The process of proving a person is who they say they are. Authentication can happen by having the person provide one of the following:
- Something they know (like a password or security question)
- Something they are (a biometric measure like a fingerprint or face scan)
- Something you have (like a token or authenticator app on a phone) By Miguel A. SP
is for
Blacklist, biometric validation.
The blacklist is a list where we write directions, internet ports, emails, nickname of users that we
think are malicious for our integrity in the digital world. Otherwise, the white list, is a list where we
write secure directions, nicks, emails and more.
Biometric validation is a method of authentification with parts of our body, for example the eyes,
the mouth, fingerprint or our voice. By Heri SP
is for C in CyberSecurity is for Cryptography. Cryptography is a method of protection used to save
communications and information using different codes. By William SP
- < BEGINNING
- END >
-
DOWNLOAD
-
LIKE
-
COMMENT()
-
SHARE
-
SAVE
-
BUY THIS BOOK
(from $5.39+) -
BUY THIS BOOK
(from $5.39+) - DOWNLOAD
- LIKE
- COMMENT ()
- SHARE
- SAVE
- Report
-
BUY
-
LIKE
-
COMMENT()
-
SHARE
- Excessive Violence
- Harassment
- Offensive Pictures
- Spelling & Grammar Errors
- Unfinished
- Other Problem
COMMENTS
Click 'X' to report any negative comments. Thanks!