3. CAPTCHA:
A computer program or system intended to distinguish
human from machine input.
CAPTCHA is an acronym that stands for "Completely
Automated Public Turing test to tell Computers and
Humans Apart .“
A computer program such as a bot will be unable to
interpret the distorted letters, while a human being
can interpret them.
4. CYBER ATTACK:
CYBER THREATS:
A cyber attack is an assault launched
by cybercriminals using one or more computers against a
single or multiple computers or networks.
Cyber threats are malicious
attempts to cause disruptions to a computer system or
network by stealing valuable data or accessing unauthorized
files.
5. EXPLOIT:
VULNERABILITY:
An exploit is a piece of software, a chunk of
data, or a sequence of commands that takes advantage of a
vulnerability to cause damage.
( to use something to one’s own advantage)
Vulnerability is a weakness which
can be exploited by a threat actor, such as an attacker, to
perform unauthorized actions.
6. MITIGATION:
DATA BREACH:
PATCH:
Data breach is a confirmed incident in
which sensitive, confidential or protected data has been accessed
and/or disclosed in an unauthorized fashion .
• Threat Mitigation refers to the policies or
the processes used to, lessen the extent of a damage , when
security attacks happen.
A patch is a small piece of software that a company
issues whenever a security flaw is uncovered.
7. AUTHENTICATION
Validating or verifying an identity of a user before
allowing access.
Two phases:
Identification
Actual authentication
Identification – The user id you enter.
Actual authentication – password or pin
8. It is a security process in which users provide two different
authentication factors to verify themselves.
Two-factor authentication methods rely on a user providing
a password, as well as a second factor, usually either a
security token
80% of data breaches can be prevented by 2FA.
Less than 10% of users adopted 2FA over the course of over
7 years.
TWO FACTOR AUTHENTICATION
9. MFA: It is the most sophisticated authentication method that
uses 2 or more independent factors to grant user access to a system.
Something you know - a password or a pin
Something you have - mobile phone or a security
token
Something you are - fingerprint or Face ID
Something you do - typing speed, locational
information
MULTI FACTOR AUTHENTICATION