- Adequate Security
- Administrative Controls
- Adverse Events
- Asset
- Audit
- Authentication
- Authorization
- Availability
- Baseline Security
- Breach
- Business Continuity
- Business continuity planning (BCP)
- Business Impact Analysis (BIA)
- Chief Information Security Officer (CISO)
- CIA Triad
- Classified Information
- Confidentiality
- Crime Prevention through Environmental Design (CPTED)
- Criticality
- Data Integrity
- Defense in Depth
- Disaster Recovery (DR)
- Disaster Recovery Plan (DRP)
- Discretionary Access Control (DAC)
- Encrypt
- Encryption
- Event
- Exploit
- Firewalls
- General Data Protection Regulation (GDPR)
- Health Insurance Portability and Accountability Act (HIPAA)
- Impact
- Incidense Response
- Incident
- Incident Response Plan
- Incident Response Team (IRT)
- Information Security Risk
- Insider Threat
- Institute of Electrical and Electronics Engineers (IEEE)
- Integrity
- International Organization for Standardization (ISO)
- Internet Engineering Task Force (IETF)
- Intrusion
- ISACA (Information Systems Audit and Control Association)
- Layered Defense
- Likelihood
- Likelihood of Occurrence
- Log
- Log Anomaly
- Logical Access Control Systems
- Mandatory Access Control
- Mantrap
- Multi-factor Authentication (MFA)
- National Institute of Standards and Technology (NIST)
- Non-repudiation
- Object
- Personally Identifiable Information (PII)
- Physical Access Controls
- Physical Controls
- Policy
- Principle of Least Privilege
- Privacy
- Privileged Account
- Probability
- Procedure
- Protected Health Information (PHI)
- Qualitative Risk Analysis
- Quantitative Risk Analysis
- Ransomware
- Risk
- Risk Acceptance
- Risk Apetite
- Risk Assessment
- Risk Avoidance
- Risk Management
- Risk Management Framework
- Risk Mitigation
- Risk Priority
- Risk Tolerance
- Risk Treatment
- Role-based access control (RBAC)
- Rule
- Security Controls
- Security Operations Center (SOC)
- Segregation of Duties
- Senior Data Security Analyst
- Sensitivity
- Single-factor Authentication (SFA)
- SolarWinds Hack
- Something You Are
- Something You Have
- Something You Know
- Standart
- Subject
- Supply Chain Attack
- System Integrity
- Technical Controls
- Technical Controls
- Threat
- Threat Actor
- Threat Vector
- Transfer
- Two-Person Integrity
- Unix
- User Provisioning
- Vulnerability
- Zero Day