The concept of least privilege advocates that the most restricted amount of access to resources is the best. The best security posture, then, is Default DENY.
Security should be deployed in layers to thwart attackers. This is known as defense in depth.
Different techniques should be used together to cause attackers to change strategies constantly. This is known as diversity of defense.
Encryption, or the act of encoding information to make it impossible to read, is one of the most common methods of protecting data.
Typical types of attack modes are man-in-the-middle (with or without replay), denial of service, and the exploitation of programming errors.
Probably the most common form of security breach is the virus or Trojan horse. These are malicious programs that hide from the user and damage or steal data.