Estimated cost, loss, or damage that can result if a threat exploits a vulnerability, Exposure, Access control, Audit, Encryption, Security feature designed to restrict who has access to a network, IS, or data, Encryption, Access control, Audit, Plain text, Procedure of generating, recording, and reviewing a chronological record of system events to determine their accuracy, Plain text, Encryption, Audit, Ciphertext, Transforming data into scrambled code to protect them from being understood by unauthorised users, Plain text, Ciphertext, Authentication, Encryption, Readable text, Plaintext, Cleartext, Ciphertext, ASCII, Encrypted text, Ciphertext, Algorithm, Keys, Cleartext, Method (usually based on username and password) by which an IS validates or verifies that a user is really who he or she claims to be, Biometrics, Authentication, Firewall, IDS/IPS, Methods to identify a person based on a biological feature, such as a fingerprint or retina, IDS/IPS, Biometrics, Firewall, Fault tolerance, Software or hardware device that controls access to a private network from a public network (Internet) by analysing data packets entering or exiting it, Fault tolerance, Firewall, IDS/IPS, CIA, A defense tool used to monitor network traffic (packets) and provide alerts when there is suspicious traffic, or to quarantine suspicious traffic, Intrusion detection system (IDS), Fault tolerance, CIA, Intrusion prevention system (IDS).

Leaderboard

Visual style

Options

Switch template

)
Continue editing: ?