Security
Integrity
Crimes
Malware
General
100

Scrambling data so that it cannot be understood without a key

Encryption

100

Can be done to see if input is numeric, alphanumeric, currency, Boolean etc

Data Type Check

100

Unauthorized accessing of a computer system

Hacking

100

Malicious code or program that destroy or corrupt files

Virus

100

Software secretly installed to monitor the users actions

Spyware

200

Who you are

Biometrics

200

Transposition of letters

Transcription error 
200

Unauthorized copying or selling of software

Software Piracy

200

A malware that replicates itself into computer memory until there is no space remaining

Worm
200

Special type of software use to remove malwares

Anti-virus Software

300

Recording all network activities

Audit Trail

300

Asking user to enter password twice

Double Entry

300

Secretly listening on a conversation over the internet

Electronic Eavesdropping

300

Malware that is often disguised as legitimate software; impostor 

Trojan Horse

300

The right of an individual to determine what information is stored about them

Data Privacy

400

Long term data storage

Archiving 

400

Checking for accurate transcription of data entered

Verification 

400

Obtaining confidential information from companies by spying to gain advantage

Industrial Espionage

400

Preventing the operating system from loading properly by corrupting or replacing instruction

Boot Sector Virus

400

Electronic means to manipulate an event or influence public perception toward a certain point of view

Propaganda

500

Using two or more authentication mechanism 

Multi-factor authentication 

500

Checks perform to see if data entered obeys the rules which applies to it

Validation 

500

Backdoor connection to a remote computer and control it

Remote Login

500

Holding your computer hostage and demanding money to regain the ability to use your computer again

Ransomware 

500

Trying every possible combination of characters to find the password

Bruce Force Attack