Security issues
The security of systems
Data
Physical devices and connections
Internet and Protocols
100

Illegal activities that are performed online.

cybercrime

100

software and/or hardware that functions as a protection blocking unwanted information that may harm a network.

firewall

100

An enormous amount of information.

Big Data

100

A wire that is made of copper that is insulated and used to transfer data and is widely known as one of the primary items to connect Televisions.

a coaxial cable

100

This protocol is used to shape and send pages across the Internet.

Hypertext Transport Protocol (HTTP)

200

A direct or indirect attack on information and/or computers that usually results in violence.

cyberterrorism

200

The act of coding information in a way that makes it hard for anyone else to decipher it other than the correct receiver.

encryption

200

This is where information that is alike in someway is stored.

a data file

200

A cable that is made up of glass strands that transfers data by using light.

a fiber-optic cable

200

Works as an address that every device connected to the Internet has.

an IP address

300

War against a country or countries usually caused by software.

cyberwarfare

300

A step or steps that verifies that the person trying to access the information is the correct person and not a fraud.

authentication

300

The act of taking care of a quantity of information that is spread over a company or organization.

data governance

300

A device that "routes" messages from and to local area networks across a small or large distance.

a router

300

The protocol that is used when a telephone call is sent from or received by the Internet.

 Voice-over Internet Protocol (VoIP)

400

Software from a different source that can hide within a system and steal your information.

a spyware

400

A key that is used to access information.

a password

400

This is a reference point that gives information about anything that has to do with data.

a data dictionary

400

A cable that consists of wires twisted together in groups of two.

 a twisted-pair wire

400

A reliable way of sending information over networks.

TCP/IP (Transmission Control Protocol/ Internet Protocol)?

500

The act of stealing someone else's information and posing as the victim, usually resulting in the ruin of someone's reputation.

identity theft

500

When a company specifically chooses certain software that can not be used within the company.

blacklisting

500

"Information technologies used to systematize, enhance, and expedite intra- and interfirm knowledge management."

Knowledge management systems

500

Computers that serve as a "gateway" to information and/or many services.

a server

500

Specific information and resources that are located on one place over the web of a person or business.

 a Web site?