Controls
Safeguards for reducing specific security risks
Encryption
Encoding data
Authentication
Process of verifying identity
Biometrics
Unique physical characteristics
Bushing
Exploitation of voice communication to impersonate you
Authorization
Granting access to specific redo in a system