Search Results for:

Shoulder surfing

Shoulder surfing is when crooks keep tabs on you to steal your details to compromise your accounts, get access to …

Assets

Assets are anything you value and want to protect They can go from the physical to the the digital. They …

Threat model

Threat modeling is a practice of working through the possible bad things that could affect the assets you consider valuable …

Sensitive personal data

Sensitive personal data is information about a person like their religious beliefs that could be used to treat them differently. …

Personal information

Personal information (PI) is an umbrella term that covers personal and sensitive details about you someone could use to describe, …

Ciphertext

When you encrypt plaintext like email messages, photos, documents, videos, music and more, you get ciphertext which scrambles information into …

Cryptography

If you’d like to hide the photos of your favorite cat or the email you sent to Santa, cryptography turns …

Plaintext

In cryptography, plaintext is any digital data like email messages, photos, documents, videos, music and more that hasn’t been encrypted …

Decryption

Decryption lets you unscramble and reveal information that’s been hidden using encryption. It does this using algorithms and a key …

Encryption

Encryption lets you hide information from prying eyes so that messages, files or devices can only be unlocked with a …