1) Attack (n) a) an attempt to gain unauthorized access to system services, resources, or information, or to compromise system integrity b) syn. penetration, intrusion 2) Authenticate (v) a) prove or show sth to be true, genuine, or valid; confirm the correctness of the claimed identity b) syn. verify, validate, confirm 3) Authorize (v) a) grant a right or a permission to a system entity to access a system resource b) syn. entitle 4) Back door (adj) a) a feature or a defect of a computer system that allows secret unauthorized access to data b) syn. trap door 5) Certificate (n) a) an official document recognizing sb as possessing certain qualifications or meeting certain standards b) syn. accredit, qualify 6) Cipher (n) a) sth written in a code; a cryptographic algorithm b) syn. code, encrypt 7) Classified (adj) a) sth or sb arranged in categories according  b) syn. categorize 8) code a) a system of symbols used to represent information in the form other than the original one b) syn. cipher, cryptogram 9) Compromise (v) a) reach an agreement or settlement of a dispute by each side making concessions; cause to become vulnerable or function less effectively b) syn. undermine, weaken, concession 10) Confidential (adj) a) information to be disclosed only to those authorized to view it b) syn. private, personal, secret, sensitive, classified 11) Corruption (n) a) dishonest or fraudulent conduct by those in power, typically involving bribery; degradation of a computer database or program by alteration or the introduction of errors b) ant. integrity 12) dedicated (adj) a) devoted to a task or purpose; exclusively allocated to or intended for a particular purpose; a mode of IS operation, wherein all users are authorized to access all data handled by the system b) syn: committed, exclusive, allocated 13) deny (v) a) refuse to give sth requested or desired to sb; refuse to admit the truth or existence of sth b) syn: reject, decline 14) encrypt (v) a) convert (information or data) into a code, especially to prevent unauthorized access b) syn. code, cypher 15) expire (v) a) (of a document, authorization, or agreement) reach the end of the validity period b) expiration (n), expired (adj) 16) expose (v) a) make sth visible by uncovering it; release sensitive data to an unauthorized entity (as a result of theft, wiretapping, etc.), cause someone to be vulnerable or at risk b) syn. endanger, imperil, jeopardize sb/sth;  c) familiarize/acquaint sb with sth 17) detect (v) a) discover or identify the presence or existence of sth b) syn. become aware/conscious of, perceive 18) digital (adj) a) relating to, using, or storing data or information in the form of signals expressed as series of the digits 0 and 1 b) syn. computerized c) ant. analogue 19) disrupt (v) a) interrupt or prevent the correct operation of system services and functions b) syn. discontinue, interfere 20) fail (v) a) be unsuccessful in achieving one’s goal; cease to work properly; break down b) syn. breakdown, malfunction, go wrong;  c) ant. succeed 21) filter (n) a) a piece of software that processes data before passing it to another application, for example by reformatting characters or removing unwanted types of material b) syn. sift, purify 22) firewall (n) a) either a hardware program or a feature intended to filter incoming and outbound traffic b) syn: security, gateway 23) identity (n) a) the characteristics determining who or what a person or thing is b) syn. selfhood 24) integrity (n) a) the quality of being honest and having strong moral principles; the state of being undivided; internal consistency or lack of corruption in electronic data b) syn. soundness, wholeness, solidity 25) intrude (v) a) enter with a disruptive or adverse effect; gain access to sensitive data without authorization by circumventing a system's security protection b) syn. encroach, infringe on, invade, disrupt 26) log in/on (v) a) gain access to a session to use system resources usually by providing a user name and password to an access control system b) ant. log off/out 27) password (n) a) a secret word or phrase used to gain admission to a place; a string of characters that allows access to a computer, interface, or system b) (in)valid 28) penetrate (v) a) go into or through sth especially with force or effort; gain unauthorized access to sensitive data by circumventing a system's protections b) syn. infiltrate, invade 29) privacy (n) a) the state of being free from public attention; the right of a person to determine the degree to which s/he will share information about him/herself with others b) syn: confidentiality c) ant. publicity, public 30) Proprietary (adj) a) sth owned by an individual or a company, which needs to be licensed from the owner before it can be used b) ant. open, public/generic (brand) 31) rely (v) a) depend on sb/sth with full trust or confidence b) syn. be confident of; depend on, trust 32) risk (n) a) exposure to danger, the possibility that something unpleasant or unwelcome will happen b) syn. insecurity, 33) safety (n) a) the condition of being protected from or unlikely to cause danger, risk, or injury b) syn. security c) ant. insecurity 34) scan (v) a) look quickly but not very thoroughly through sth; convert a document or picture into digital form; check manally or automatically for viruses and malware b) ~ for/through/into the computer; ~ data/information/library/the contents/pages/headings; 35) secret (n) a) not known or seen or not meant to be known or seen by others b) syn. cryptic, confidential, classified 36) secure (adj) a) protected against attack or other criminal activity b) ant. insecure, insecurity 37) sensitive (adj) a) quick to detect or respond to slight changes, signals, or influences; kept secret or with restrictions on disclosure to avoid endangering security b) ant. insensitive 38) threat (n) a) a person or thing likely to cause damage or danger, a potential for violation of security or inflicting harm b) syn. jeopardy, menace 39) valid (adj) a) legally or officially acceptable or binding; in legal force b) syn. effective c) ant. invalid, ineffective 40) vulnerability (n) a) a flaw or weakness in a system that could be exploited to violate the system's security policy b) ant. immune, immunity

Leaderboard

Visual style

Options

Switch template

Continue editing: ?