hostage exploit until payment
ransomware
network level protection against unauthorized access
firewall
denial-free proof of origin or delivery
nonrepudiation
scramble data into a code that requires right key to interpret
encrypt
specilaized format most suited for transmission or storage
encoding
security measure against bots
captcha
symmetric block cipher
AES
public key encryption
RSA
grant or deny access to resource
authorization
validate credentials
authetication
improves password strength or nonpredictability
entropy
protection of classified information
confidentiality
chronological record used as documentary evidence to trace sequence of activities
audit trail
acquire sensitive information by masquerading as a trustworthy entity
phishing
information collected about a remote computing device for the purpose of identification
fingerprinting