Ch 12 - Using MIS

threat

vulnerability

target

pretexting

phishing

hacking

usurpation

intrusion detection system (IDS)

brute force attack

risk

uncertainty

Kerberos

encryption

key

malware

virus

worm

spyware

bot

botnet

hardening