ROM (Read-only Memory)

ROM (Read-only Memory): A type of non-volatile storage used in computers and other electronic devices. It contains firmware that is permanently written during the manufacturing process and cannot be modified under normal computer operation. This makes ROM a secure place to store critical system instructions because they can’t be altered or deleted by malicious software […]

Safeguard

Safeguard: A measure or procedure designed to protect against loss, damage, or unauthorized access to information or assets. It is used in security to prevent or mitigate risks to an organization’s assets or information. Examples of safeguards include implementing firewalls to protect against cyber-attacks or installing security cameras to deter theft.

Root of trust

Root of trust: A set of functions in the trusted computing base with properties that let them be trusted. The Root of Trust serves as a foundation for other system components, ensuring that the hardware, firmware, and software loaded on the system are authentic, unaltered, and, therefore, trustworthy. It is a critical concept in security […]

Salami technique

Salami technique: A type of fraud that involves the slicing off of small amounts of money from multiple transactions to create a larger sum. It is often used in financial crimes to steal money from a large number of victims. Examples of salami techniques include a bank employee taking small amounts of money from multiple […]

Rotation of duties

Rotation of duties: A strategy employed to reduce the risk of fraud, errors, and misuse within an organization. It involves periodically rotating employees through different positions and responsibilities to disrupt any actions that might lead to unauthorized or malicious activity. This process helps identify irregularities, provides cross-training opportunities, and ensures no single individual holds a […]

Salt

Salt: A random string of characters added to a password before it is hashed. It is used in cryptography to make it more difficult for attackers to crack hashed passwords. Examples of salt include adding a string of random numbers to a password before it is hashed or using a unique salt for each password […]