Access Control ensures that resources are only granted to those users who are entitled to them.
Digital content that is self published to reach your audience.
C for cats
E for elephant
A Baiting counter-tactic that is used against a threat actor. Typically, a monitored computer, that appears to hold valuable information, is placed onto a isolated network in the infrastructure. This allows detection of unauthorized access, analysis of their behavior, and protection.
I for Ice King
L for LEROOOY JENKINS
N for Never Give Gonna Give You Up
Hostage-Negotiation situation where the hostage is your proprietary information. The threat-actor will take a cipher, encrypt that data, and leave a message that locks down with a timer the infrastructure saying that they need to pay up or forever lose that data. If the ransom isn't paid during the allocated time, it will delete that data. In most cases, they'll just take the money and run off, so make sure that your data is backed up and verify.
Emails that are typically sent en mass to receptions that are either unwanted or inappropriate.
An individual, or group of people, whose intent is to cause harm to your infrastructure. You may also see the term Black-Hat hacker be used interchangeably.
VPN (Virtual Private Network)