Norfolk State University Socio-CybersecurityNorfolk State University Socio-Cybersecurity
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    Register Login

    Glossary

    • Home
    • Modules
    • Social Problems
    • Passwords
    • Glossary

    Glossary for Password Module

    1. Password- A secret word or other string of characters used by authorized persons to prove their right to access
    2. Cybersecurity- Precautions taken to guard against crime that involves the internet, especially unauthorized access to computer systems and data connected to the internet
    3. Rational Choice Theory- Rational thinking influenced certain decisions or behaviors. People make decisions based on a calculated cost-benefit analysis. (“What do I gain and/or lose from a specific action?”). Gary Becker.
    4. Authentication ensures that the individual is who she claims to be (the authentic or genuine person) and not an imposter. A person accessing the web server that contains a user’s credit card number must prove that she is indeed who she claims to be and not a fraudulent attacker. One way in which authentication can be performed is by the person providing a password that only she knows.
    5. Confidentiality ensures that only authorized parties can view the information. Providing confidentiality can involve several different security tools, ranging from software to “scramble” the credit card number stored on the web server to door locks to prevent access to those servers.
    6. Integrity ensures that the information is correct and no unauthorized person or malicious software has altered the data. In the example of the online purchase, an attacker who could change the amount of a purchase from $10,000.00 to $1.00 would violate the integrity of the information.
    7. Availability ensures that data is accessible to authorized users (and that the information is not “locked up” so tight that they cannot access it).
    8. Brute Force Attack- A type of attack that relies purely on trial and error
    9. Dictionary Attacks- Attempts to crack a password by testing it against a list of dictionary words
    10. Vulnerability- Capable of or susceptible to being attacked

    Search

    Department of Sociology
    Norfolk State University
    700 Park Avenue,
    Norfolk,
    Virginia 23504
    USA
    Tel: 757-823-8436

    This Project is funded by the National Science Foundation

    © 2019. NSU Socio-Cybersecurity Project. All Rights Reserved