Chrome
Protection
Other
100

Google's Web Store where users can download or purchase games, applications, themes, or extensions.

Chrome Web Store

100

The process when a subject must verify their identity.

Authentication

100

G Suite administrators can enforce advanced policies that help improve security.

Policy Enforcement 

200

The settings menu can be accessed by clicking the gear of the status tray at the bottom right-hand corner of the screen.

Chromebook Settings

200

Translates data into a type of code (encoding) that only allows authorized sources to decipher the code into readable text with the use of a security key.

Encryption

200

A type of non-volatile software and code is strictly designed for reading purposes.

Read Only Memory (ROM)

300

A tool that is unique to Chrome OS, which is a shell environment that can be accessed by pressing CTRL + ALT + T.

Crosh

300

A standard designed to grant users the ability to share information across multiple accounts with a third-party application or website.

Oauth2

300

A network computing device that sends and receives data from the internet.

Router
400

One of three different channels available to Chrome users that allows more functionality with Chrome OS

Developer Mode

400

Another way for users to protect their account by requiring a second level of authentication.

Second Factor Authentication (2FA)

400

A fully funtional system on an integrated circuit.

System on a Chip (SoC)

M
e
n
u