Risk
physical security
Introducing security
100

The probability that an event will occur is ...

risk

100

process of restricting access to a resource to only permitted users, applications or computer systems

access control 

100

the consistency, accuracy, and validity of data or information.

integrity

200

Identifies the risks that might impact your particular environment

risk assessment

200

using multiple layers of security to defend your assets

defense in depth

200

characteristic of a resource ensuring access is restricted to only permitted users applications or computer systems

confidentiality

300

The act of identifying and then making an informed decision to accept the likelihood and impact of a specific risk

risk acceptance

300

small device that are used to process information, send and receive emails, store enormous amounts of data 

mobile device

300

a resource being accessible to a user application or computer system 

availability

400

The act of taking steps to move responsibility for a risk to a third party through insurance or outsourcing.

risk transfer

400

storage device that is designed to be taken out of a computer without turning the computer off

removable device 

400

helps to identify the attack surface that an organization may be susceptible to

attack surface

500

 Provides a formal mechanism for documenting the risks, impacts, controls, and other information required by the risk management program.

risk register

500

a software or hardware device that captures passwords and other critical data directly from the keyboard

keylogger

500

is a method used to gain access to data, systems, or networks, primarily through misrepresentation.


Social engineering