Matching Pairs Layers of SecurityOnline version Match the definition with the correct term. by Quintasia Hurt 1 Integrity 2 Availability 3 risk management 4 risk mitigation 5 CIA 6 risk assessment 7 confidentiality 8 Defense in depth 9 Access control 10 attack surface 11 social engineering confidentiality, integrity, availability The process of identifying, assessing, and prioritizing threats and risks. A method used to gain access to data, systems, or networks, primarily through misrepresentation. This technique typically relies on the trusting nature of the person being attacked. The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems. Identifies the risks that might impact your particular environment. Describes a resource being accessible to a user, application, or computer system when required. Taking steps to reduce the likelihood or impact of a risk. The exposure, the reachable and exploitable vulnerabilities that a system or technology has. The consistency, accuracy, and validity of data or information. One of the goals of a successful information security program is to ensure that data is protected against any unauthorized or accidental changes. The process of restricting access to a resource to only permitted users, applications, or computer systems.