▶ 1.7 Resources
Important Terms Introduced
active attack
administrator
antivirus software
app
attack
attack matrix
attack surface
attack vector
attacker
availability
back door
backup copy
basic principle
black-hat hacker
botnet
CIA properties
compromised system
computer virus
confidentiality
Continuous Improvement
cracker
defense
defense in depth
disclosure
forgery
hacker
hacktivist
high motivation
hunter’s dilemma
identity theft
information security architecture
insider threat
integrity
layered defense
least privilege
low motivation
malware
masquerade
moderate motivation
passive attack
phone phreak
physical theft
risk assessment
risk matrix
router
scant motivation
script kiddie
security domains
security plan
security policy
social forgery ...
Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.