1.7 Resources

Important Terms Introduced

  • active attack

  • administrator

  • antivirus software

  • app

  • attack

  • attack matrix

  • attack surface

  • attack vector

  • attacker

  • availability

  • back door

  • backup copy

  • basic principle

  • black-hat hacker

  • botnet

  • CIA properties

  • compromised system

  • computer virus

  • confidentiality

  • Continuous Improvement

  • cracker

  • defense

  • defense in depth

  • disclosure

  • forgery

  • hacker

  • hacktivist

  • high motivation

  • hunter’s dilemma

  • identity theft

  • information security architecture

  • insider threat

  • integrity

  • layered defense

  • least privilege

  • low motivation

  • malware

  • masquerade

  • moderate motivation

  • passive attack

  • phone phreak

  • physical theft

  • risk assessment

  • risk matrix

  • router

  • scant motivation

  • script kiddie

  • security domains

  • security plan

  • security policy

  • social forgery ...

Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.