A security technique that regulates who or what can view or use resources in a computing environment (note: 2 words)
Starts with
B
The physical or behavioral human characteristics to that can be used to digitally identify a person to grant access to systems, devices or data.
Starts with
C
The need to ensure that information is disclosed only to those who are authorized to view it (also part of the CIA triad).
Starts with
D
What most individuals and organizations would want to protect the most; especially if it's considered private and confidential.
Starts with
E
Cryptographic transformation of data (called "plaintext") into a form (called "cipher text") that conceals the data's original meaning to prevent it from being known or used.
Starts with
F
The most common part of the human body used in biometrics identification
Starts with
H
The most common permanent storage medium within a personal computer used for backup. (note: 2 words)
Starts with
I
An adverse network event in an information system or network or the threat of the occurrence of such an event.
Starts with
L
The recommended _________________ of a password is not less than 8 characters.
Starts with
M
Short for malicious software.
Starts with
P
a high-level document that defines the organization's vision concerning security, goals, needs, scope, and responsibilities.
Starts with
R
A type of malware that is a form of extortion and usually targeted towards users' mobile devices.
Starts with
S
A ________________ is an electronic badge that includes a magnetic strip or chip that can record and replay a set key. Smurf
Starts with
T
A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
Starts with
U
The short name, usually meaningful in some way, associated with a particular computer user.
Starts with
V
A flaw or weakness that can be used to attack a system or organization
Starts with
W
A type of malware commonly spread through email systems due to a user's mistake in clicking on attachments that are unsafe.
Starts with
Z
A computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse.