Confidentiality (CIA Triad)intergrity ( CIA Triad )availability ( CIA Triad)The Parkerian Hexadpossesion or control
... [Show More]
( the parkerian Hexad)
authenticity ( the parkerian Hexad)
Utility ( the parkerian Hexad)
interceptions ( four types of attacks)
Data at Rest
Data in motion
interruption ( four types of attacks)
modification ( four types of attacks )
Fabrication ( four types of attacks)
Threats
Vunerabilities
Risk
Impact
Risk Management process
Identify Assets ( risk management Process )
identify threats
Assess
[Show Less]