Front Side: Confidentiality Integrity Availability Authentication Authorization Non-repudiation Access Control Malware Social Engineering Vulnerability Exploit Risk Assessment Risk Management Disaster Recovery Plan Business Continuity Plan Defense in Depth Principle of Least Privilege Security Policy Data Loss Prevention Cryptography Back Side: Back Side: The protection of sensitive information from unauthorized disclosure. The assurance that data is not modified or destroyed in an unauthorized manner. The assurance that authorized users have access to data and systems when they need it. The process of verifying the identity of a user, device, or other entity in a computer system. The process of granting or denying access to a user, device, or other entity in a computer system. The assurance that a user cannot deny having taken a particular action in a computer system. The process of controlling who has access to a computer system and what they are allowed to do. Software designed to harm or exploit computer systems, often delivered through malicious email attachme Techniques used to manipulate individuals into divulging sensitive information or performing actions that m A weakness in a system that can be exploited to compromise its security. The use of a vulnerability to gain unauthorized access to a system or perform unauthorized actions within i The process of identifying and analyzing potential risks to a computer system or network. The process of mitigating or accepting identified risks to a computer system or network. A plan for recovering from a disaster or catastrophic event that disrupts normal business operations. A plan for ensuring that critical business functions can continue in the event of a disaster or catastrophic ev A security strategy that uses multiple layers of defense to protect a computer system or network. The practice of giving users only the privileges they need to perform their job duties and nothing more. A document that outlines an organization's policies, procedures, and standards for information security. Technologies and processes designed to prevent the accidental or intentional loss of sensitive data. The practice of securing information by encoding it so that it can only be read by authorized parties using a