Confidentiality
Prevent the disclosure of sensitive information from unauthorized access
Integrity
Prevention of unauthorized modification
Availability
Assurance that systems and data are accessible by authorized users when needed
Vulnerability
A system, network or device weakness
Threat
Potential danger posed by a vulnerability
Threat agent
The entity that identifies a vulnerability and seeks to exploit it
Risk
The likelihood of a threat agent taking advantage of a threat combined with the corresponding business impact
Exposure
Potential to experience loss from a threat
Countermeasure
Actions to mitigate potential threats and reduce risk
Asset
The item(s) to be protected
Dealing with risk
Accept = acknowledge but no mitigation Transfer = shift responsibility Mitigate = apply safeguard Avoid = eliminate exposure or the asset