The probability that an event will occur is ...
risk
process of restricting access to a resource to only permitted users, applications or computer systems
access control
the consistency, accuracy, and validity of data or information.
integrity
Identifies the risks that might impact your particular environment
risk assessment
using multiple layers of security to defend your assets
defense in depth
characteristic of a resource ensuring access is restricted to only permitted users applications or computer systems
confidentiality
The act of identifying and then making an informed decision to accept the likelihood and impact of a specific risk
risk acceptance
small device that are used to process information, send and receive emails, store enormous amounts of data
mobile device
a resource being accessible to a user application or computer system
availability
The act of taking steps to move responsibility for a risk to a third party through insurance or outsourcing.
risk transfer
storage device that is designed to be taken out of a computer without turning the computer off
removable device
helps to identify the attack surface that an organization may be susceptible to
attack surface
Provides a formal mechanism for documenting the risks, impacts, controls, and other information required by the risk management program.
risk register
a software or hardware device that captures passwords and other critical data directly from the keyboard
keylogger
is a method used to gain access to data, systems, or networks, primarily through misrepresentation.
Social engineering