COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
“Information that can be used to identify you because it is unique to you.” is called____
A
internet scam
B
identity theft
C
private information
D
phishing
Explanation: 

Detailed explanation-1: -Personally identifiable information (PII) is any data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another and can be used to deanonymize previously anonymous data is considered PII.

Detailed explanation-2: -Personally identifiable information (PII) uses data to confirm an individual’s identity. Sensitive personally identifiable information can include your full name, Social Security Number, driver’s license, financial information, and medical records.

Detailed explanation-3: -PII might consist of direct identifiers, such as the name, social security number or other information that is unique to an individual, or indirect identifiers. Indirect identifiers include uncommon race, ethnicity, extreme age, unusual occupation and other details.

Detailed explanation-4: -PII is information that can be used to uniquely identify, contact, or locate a single person. Personal information that is “de-identified” (maintained in a way that does not allow association with a specific person) is not considered sensitive.

Detailed explanation-5: -Below are the types of the types of personal information generally covered: Private information. Sensitive personal data information. Health information.

There is 1 question to complete.