Access
Securinator
Steele Data
Continuity
Sick PC
100

creating one or more barriers around a resource that only authenticated users can gain access to 

Access Control

100

the goals for providing a secure information management system  

CIA triad

100

A social engineering technique of discovering things about an organization based on what it throws away

Dumpster Diving

100

protecting against system failure by providing extra capacity

Redundancy (Fault Tolerance)

100

software that records information about a PC and its user such as a user's purchase history

Adware

200

a network attack that aims to disrupt a service usually by overloading it

Denial of Service

200

default administrative and guest accounts configured on servers and network devices that provide possible points of unauthorized access 

default accounts

200

listening in to communications sent over media

Eavesdropping

200

device that provides alternative AC power supply in the event of a power failure (requires a battery)

UPS

200

software installed without user's knowledge to gather passwords or financial information 

SPYWARE

300

the basic security principle stating that something should be allocated with the minimum necessary rights, privileges, or information to perform their role

least privilege

300

identifying, testing, and deploying OS and application updates via patches

Patch Management

300

attacker intercepts communications between two hosts

Man in the Middle

300

the principle that something should not be so secure that it is completely inaccessible

Availability

300

type of malware that tries to extort money from the victim

Ransomeware

400

attacker disguises identity to gain network access

Spoofing

400

permissions attached or configured on a network device, resource, or file and folder

Access Control List

400

social engineering tactic to obtain someone's password or PIN by observing him/her as they type it

Shoulder Surfing

400

a secret text string used as part of a logon

Password

400

A malicious software program hidden with an innocuous-seeming piece of software.  

Trojan Horse

500

email attack created to trick users into providing authentication or financial information

Phishing

500

a means for a user to prove their identity to a computer/server

Authentication

500

these attacks include impersonation, domination, and charm to gain trust 

Social Engineering

500

access control model where resources are assigned permissions according to job function rather than personally

Role Based Access Control

500

code designed to infect computer files when it is activated, it is also programmed to carry out malicious actions such as deleting files or changing system settings

Virus

M
e
n
u