threat
vulnerability
target
pretexting
phishing
hacking
usurpation
intrusion detection system (IDS)
brute force attack
risk
uncertainty
Kerberos
encryption
key
malware
virus
worm
spyware
bot
botnet
hardening