Looks like no one added any tags here yet for you.
Non-repudiation
Provides validation of message origin
Asset
Something that has value to an individual or organization
Threat
Anything that can potentially lead to the loss of an asset
Threat agent
Person or entity that attempts or carries out a threat
Layered Security
Security approach that combines multiple security controls and defenses to create a cumulative effect
Bottom Layer of LS Model
Policies, procedures, awareness
Top Layer of LS Model
Data
Credential Harvesting
Attackers impersonating trusted websites or entities to gain access to user credentials (usernames, passwords, credit card info)
Trojan Horse
Malware that downloads onto a computer disguised as a legitimate program
Worm
Malware or malicious software that can replicate rapidly and spread across devices in a network
Virus
Malware or malicious software that cannot self-replicate, it needs to be sent from one computer to another via a user or software
RAT (Remote Access Trojan)
Malware designed to allow an attacker to remotely control an infected computer
Rootkit
Set of software tools that enables an unauthorized user to gain control of a computer system without being detected
Spyware
Software that enables a user to obtain information about another computer’s activities by transmitting data covertly from their hard drive
Bots
A software application programmed to execute specific tasks as part of another computer program or to simulate human activity
Botnets
A network of computers infected by malware that are under the control of a single attacking party
Logic Bombs
A piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions that would be considered malicious by the owner of the computer
Password attack
When a hacker tries to steal your password
Physical attack
Security breach that impacts operations, damages property, or impacts physical environment
Cloud-based attack
Cyber attack that targets cloud-based service platforms
On-premise attack
Security threats that target on-premise systems and services, such as local servers and desktop computers