Scrambling data so that it cannot be understood without a key
Encryption
Can be done to see if input is numeric, alphanumeric, currency, Boolean etc
Data Type Check
Unauthorized accessing of a computer system
Hacking
Malicious code or program that destroy or corrupt files
Virus
Software secretly installed to monitor the users actions
Spyware
Who you are
Biometrics
Transposition of letters
Unauthorized copying or selling of software
Software Piracy
A malware that replicates itself into computer memory until there is no space remaining
Special type of software use to remove malwares
Anti-virus Software
Recording all network activities
Audit Trail
Asking user to enter password twice
Double Entry
Secretly listening on a conversation over the internet
Electronic Eavesdropping
Malware that is often disguised as legitimate software; impostor
Trojan Horse
The right of an individual to determine what information is stored about them
Data Privacy
Long term data storage
Archiving
Checking for accurate transcription of data entered
Verification
Obtaining confidential information from companies by spying to gain advantage
Industrial Espionage
Preventing the operating system from loading properly by corrupting or replacing instruction
Boot Sector Virus
Electronic means to manipulate an event or influence public perception toward a certain point of view
Propaganda
Using two or more authentication mechanism
Multi-factor authentication
Checks perform to see if data entered obeys the rules which applies to it
Validation
Backdoor connection to a remote computer and control it
Remote Login
Holding your computer hostage and demanding money to regain the ability to use your computer again
Ransomware
Trying every possible combination of characters to find the password
Bruce Force Attack