What term refers to the process of converting cleartext, or unencrypted, data into an unreadable format by using a special key and mathematical algorithm.
Encryption
What term refers to the Detection of a security incident discovered when not actively looking for it?
Passive detection
What term refers to a metal pole installed in the ground to prevent vehicle access. Can be installed near the front of a building to prevent a vehicle from getting too close?
Bollard
What term refers to the process in which users provide credentials to prove their identity?
Authentication
What term refers to the practice of exploiting people to gain access to unauthorized areas and systems?
Social engineering
What term refers to any data that is not currently being accessed?
Data at rest
What term refers to the detection of a security incident when actively looking for security incidents?
Active detection
What term refers to the process of someone attempting to enter a building by following closely behind an authorized person or sneaking in with a group of authorized people?
Piggybacking / Tailgating
What term refers to the process that defines the resources a user can access once authenticated?
Authorization
What term refers to an attack that uses a malicious email crafted to look legitimate. The intent is to have a user click a link to a malicious website or download a malicious file?
Phishing
What term refers to the process of proving a user's identity?
Authentication
What term refers to the detection of a security incident when the organization is actively looking for security flaws in its systems?
Proactive detection
What term refers to a specialized entrance with two doors that creates a security buffer zone between two areas?
Access control vestibule (ACV)
The practice of giving users access to only the resources needed to perform their job?
Principle of least privilege
What term refers to a social engineering attack in which the hacker gathers sensitive information by looking over a target's shoulder while the target is working on a computer?
Shoulder surfing
What term refers to the practice of giving users only the resources needed to perform their job?
Principle of least privilege
What term refers to The documentation and procedures used to detail the handling of any evidence?
Chain of custody
What term refers to a metal detector that users walk through to detect weapons or unauthorized equipment?
Magnetometer
What term refers to a mechanism used to manage and enforce user access to resources?
Access control list (ACL)
What term refers to a password cracking attack in which the attacker uses a list of words and phrases to guess the decryption key?
Dictionary attack
What term refers to the person or team that should be immediately notified when a security incident is discovered?
First responder
What term refers to a person's physical traits (such as fingerprints or retinal scans) used to verify a person's identity?
Biometrics
What term refers to a software tool that implements the policies and procedures used by an organization to maintain security and permissions on mobile devices?
Mobile device management (MDM)
What term refers to a password cracking attack in which the attacker attempts to guess passwords by using a cracking tool that submits every possible letter, number, and symbol combination?
Brute force attack