Relacionar Columnas Layers of SecurityVersión en línea Match the definition with the correct term. por Quintasia Hurt 1 risk assessment 2 Access control 3 Availability 4 attack surface 5 social engineering 6 CIA 7 risk mitigation 8 confidentiality 9 Integrity 10 Defense in depth 11 risk management Taking steps to reduce the likelihood or impact of a risk. Describes a resource being accessible to a user, application, or computer system when required. The consistency, accuracy, and validity of data or information. One of the goals of a successful information security program is to ensure that data is protected against any unauthorized or accidental changes. The exposure, the reachable and exploitable vulnerabilities that a system or technology has. confidentiality, integrity, availability The process of identifying, assessing, and prioritizing threats and risks. The process of restricting access to a resource to only permitted users, applications, or computer systems. The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems. Identifies the risks that might impact your particular environment. A method used to gain access to data, systems, or networks, primarily through misrepresentation. This technique typically relies on the trusting nature of the person being attacked.