Firewall
Vulnerability
Patch
Malware
Phishing
Social Engineering
Two-factor authentication
Encryption
Double layer of security
Weakness in a system
Manipulating people for information
Software update for security
Network security barrier
Fraudulent emails
Malicious software
Data protection through coding