Interception {Ans: } A type of attack, against confidentialityInterruption attack {Ans: } An attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basisRisk {Ans: } The likelihood that something bad will happenVulnerability {Ans: } A weakness that can be used to harm usThreat {Ans: } Some thing that has the potential to cause harm to our assetsInterception {Ans: } A type of attack, primarily against confidentialityAvailability {Ans: } Refers to the ability to access our data when we need itIntegrity {Ans: } Refers to the ability to prevent our data from being changed in an unauthorized around desirable mannerConfidentiality {Ans: } Used to keep something private or minimally knownPCI SSC {Ans: } Companies that process credit card payments must comply with the set of standardsInformation security {Ans: } Protects information and information systems from unauthorized access, use, disclosure, disruption, modification, or destructionModification attack {Ans: } An attack that involves tampering with our assetsParkerian hexad {Ans: } A model that adds three more principles to the CIA triad: possession or control, utility, and authenticityPossession or control {Ans: } The physical disposition of the media on which the data is storedAuthenticity {Ans: }