Relacionar Columnas Layers of SecurityVersión en línea Match the definition with the correct term. por Quintasia Hurt 1 confidentiality 2 Integrity 3 Availability 4 risk assessment 5 social engineering 6 attack surface 7 risk mitigation 8 CIA 9 Defense in depth 10 Access control 11 risk management The consistency, accuracy, and validity of data or information. One of the goals of a successful information security program is to ensure that data is protected against any unauthorized or accidental changes. The process of restricting access to a resource to only permitted users, applications, or computer systems. The exposure, the reachable and exploitable vulnerabilities that a system or technology has. The process of identifying, assessing, and prioritizing threats and risks. confidentiality, integrity, availability Describes a resource being accessible to a user, application, or computer system when required. Identifies the risks that might impact your particular environment. The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems. Taking steps to reduce the likelihood or impact of a risk. A method used to gain access to data, systems, or networks, primarily through misrepresentation. This technique typically relies on the trusting nature of the person being attacked.