Users/processes get only the access necessary to perform tasks
Least privilege
Secure tunnel for private communication across public networks
VPN (Virtual Private Network)
Self‑replicating malware that spreads across networks without host programs
Worm
Fraudulent messages designed to trick users into revealing information
Phishing
Payment Card Industry Data Security Standard for cardholder data protection
PCI DSS
Vulnerability unknown to the vendor and unpatched at the time of exploitation
First day of Vulnerability discovered
Zero‑day
Device or software that filters traffic by rules to block/allow connections.
Firewall / ACL
Encrypts or blocks access to data and demands payment for restoration
Ransomware
Targeted phishing tailored to a specific individual or organization
Spear phishing
U.S. regulation protecting healthcare information privacy and security
HIPAA
Ensures system boots only using trusted signed bootloaders/OS.
Secure Boot
widely used for authenticating remote users to networks via VPNs, wireless, or dial-up connections
RADIUS
Conceals presence and escalates privileges to maintain persistent access
Rootkit
What is Vishing
Voice phishing via phone calls
EU regulation governing data protection and privacy for individuals
GDPR
Never trust; always verify every access request regardless of network location.
Zero trust
Malicious AP impersonating a legitimate SSID to capture credentials
Evil twin
Operates in memory without writing files to disk, evading detection
Fileless malware
What is Smishing
Phishing via SMS/text messages
Legal requirement that data is subject to the laws of the country where it is stored
Data sovereignty
Running code in isolated environment to limit damage from malware
Sandboxing
Detects and actively blocks or prevents malicious traffic
IPS (Intrusion Prevention System)
NOT IDS (Intrusion Detection System)
Records keystrokes to capture credentials and sensitive input
Keylogger
Observing someone’s screen or input to capture sensitive information
Shoulder surfing
The documented, chronological record of evidence from the time it's collected to its presentation in court, ensuring its authenticity and integrity by detailing every person who handled it, when, and why
Chain of custody