Matching Pairs Layers of SecurityOnline version Match the definition with the correct term. by Quintasia Hurt 1 Defense in depth 2 risk management 3 CIA 4 Availability 5 risk assessment 6 confidentiality 7 Access control 8 risk mitigation 9 attack surface 10 social engineering 11 Integrity The process of restricting access to a resource to only permitted users, applications, or computer systems. Describes a resource being accessible to a user, application, or computer system when required. confidentiality, integrity, availability The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems. The exposure, the reachable and exploitable vulnerabilities that a system or technology has. Identifies the risks that might impact your particular environment. The consistency, accuracy, and validity of data or information. One of the goals of a successful information security program is to ensure that data is protected against any unauthorized or accidental changes. Taking steps to reduce the likelihood or impact of a risk. The process of identifying, assessing, and prioritizing threats and risks. A method used to gain access to data, systems, or networks, primarily through misrepresentation. This technique typically relies on the trusting nature of the person being attacked.