The following terms are often used in information security.