Ensures that data is not modified or tampered with.
Data, applications, systems, networks and physical space (as defined in access control).
A type of access control used for short-term repairs.
An instance of being exposed to losses through an attack.
A successful, intentional and malicious attack on information and/or systems.
Mechanisms that restrict physical access, such as perimeter security, site location, locks, etc.
The likelihood of an attack taking advantage of a vulnerability.
(in passwords) A password created by the system, usually two or more unrelated words divided by symbols on the keyboard.
Policies that describe accepted practices.
(in passwords) A password based on something you know.
Provides proof that data came from a specific sender.
A type of access control used to search for details about an attack or an attacker.
Any potential danger to the confidentiality, integrity or availability of information or systems.
Access to resources based on job descriptions.
The process of checking identification credentials against permissions to grant access to information or systems.
Access to resources based or location or geography.
Users, applications, or processes that need access to objects (as defined in access control).