New Activity
Play Matching Pairs

risk assessment

social engineering

attack surface

risk management

Access control

CIA

Integrity

Defense in depth

confidentiality

risk mitigation

Availability

The consistency, accuracy, and validity of data or information. One of the goals of a successful information security program is to ensure that data is protected against any unauthorized or accidental changes.

Describes a resource being accessible to a user, application, or computer system when required.

confidentiality, integrity, availability

A method used to gain access to data, systems, or networks, primarily through misrepresentation. This technique typically relies on the trusting nature of the person being attacked.

Taking steps to reduce the likelihood or impact of a risk.

The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems.

Identifies the risks that might impact your particular environment.

The process of identifying, assessing, and prioritizing threats and risks.

The exposure, the reachable and exploitable vulnerabilities that a system or technology has.

The process of restricting access to a resource to only permitted users, applications, or computer systems.