Relacionar Columnas Layers of SecurityVersión en línea Match the definition with the correct term. por Quintasia Hurt 1 risk mitigation 2 attack surface 3 Access control 4 confidentiality 5 social engineering 6 Integrity 7 Availability 8 risk management 9 CIA 10 Defense in depth 11 risk assessment The process of restricting access to a resource to only permitted users, applications, or computer systems. The process of identifying, assessing, and prioritizing threats and risks. Identifies the risks that might impact your particular environment. confidentiality, integrity, availability The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems. Taking steps to reduce the likelihood or impact of a risk. The exposure, the reachable and exploitable vulnerabilities that a system or technology has. A method used to gain access to data, systems, or networks, primarily through misrepresentation. This technique typically relies on the trusting nature of the person being attacked. Describes a resource being accessible to a user, application, or computer system when required. The consistency, accuracy, and validity of data or information. One of the goals of a successful information security program is to ensure that data is protected against any unauthorized or accidental changes.