User SecurityOnline version Guess the word based on the letter it starts with by Aidora Abdullah A B C D E F H I L M P R S T U V W Z Starts with A A security technique that regulates who or what can view or use resources in a computing environment (note: 2 words) Starts with B The physical or behavioral human characteristics to that can be used to digitally identify a person to grant access to systems, devices or data. Starts with C The need to ensure that information is disclosed only to those who are authorized to view it (also part of the CIA triad). Starts with D What most individuals and organizations would want to protect the most; especially if it's considered private and confidential. Starts with E Cryptographic transformation of data (called "plaintext") into a form (called "cipher text") that conceals the data's original meaning to prevent it from being known or used. Starts with F The most common part of the human body used in biometrics identification Starts with H The most common permanent storage medium within a personal computer used for backup. (note: 2 words) Starts with I An adverse network event in an information system or network or the threat of the occurrence of such an event. Starts with L The recommended _________________ of a password is not less than 8 characters. Starts with M Short for malicious software. Starts with P a high-level document that defines the organization's vision concerning security, goals, needs, scope, and responsibilities. Starts with R A type of malware that is a form of extortion and usually targeted towards users' mobile devices. Starts with S A ________________ is an electronic badge that includes a magnetic strip or chip that can record and replay a set key. Smurf Starts with T A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. Starts with U The short name, usually meaningful in some way, associated with a particular computer user. Starts with V A flaw or weakness that can be used to attack a system or organization Starts with W A type of malware commonly spread through email systems due to a user's mistake in clicking on attachments that are unsafe. Starts with Z A computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse.