Relier Pairs Layers of SecurityVersion en ligne Match the definition with the correct term. par Quintasia Hurt 1 Integrity 2 confidentiality 3 CIA 4 Access control 5 risk assessment 6 social engineering 7 attack surface 8 Defense in depth 9 Availability 10 risk mitigation 11 risk management The consistency, accuracy, and validity of data or information. One of the goals of a successful information security program is to ensure that data is protected against any unauthorized or accidental changes. The process of restricting access to a resource to only permitted users, applications, or computer systems. confidentiality, integrity, availability The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems. Taking steps to reduce the likelihood or impact of a risk. The process of identifying, assessing, and prioritizing threats and risks. Identifies the risks that might impact your particular environment. A method used to gain access to data, systems, or networks, primarily through misrepresentation. This technique typically relies on the trusting nature of the person being attacked. Describes a resource being accessible to a user, application, or computer system when required. The exposure, the reachable and exploitable vulnerabilities that a system or technology has.