Threats
Standard Clerical Procedures
Levels of Permitted Access
Passwords
Write-protect Mechanisms
Anti-virus Software
Encryption
Firewall
Disaster Planning
Malicious Damage
Accidental Damage
Black Hat Hacking
White Hat Hacking
Grey Hat Hacking
Phases of Pen Testing
Virus
Trojans
Spyware
Scare-ware
Ransom-ware
Botnets
Attack Vector