1 | Confidentiality | | _____ | Ease of use for users diminishes |
2 | Information Warfare | | _____ | An event involving the exposure of information to entities not authorized access to the information |
3 | Data Modification | | _____ | Get the private information (pin number/password) without any permission |
4 | Open Security Model | | _____ | The easiest to implement |
5 | Data Disclosure | | _____ | Delete files unfortunately |
6 | Closed Security Model | | _____ | May involve collection of tactical information to demoralize the enemy and the public |
7 | Information Theft | | _____ | Modify information that an attacker is not authorized to modify |
8 | Unauthorized Disclosure | | _____ | protecting information from being modified by unauthorized parties |
9 | Integrity | | _____ | Confidentiality is the protection of personal information. |
10 | Accidental Data Loss | | _____ | the information must be available when it is needed. |
11 | Restrictive Security Model | | _____ | Voluntary sharing of any and all information that is considered relevant to a given situation |
12 | Availabilty | | _____ | Products and services that ensure that data continue to be available |
13 | Data Availability | | _____ | User access is difficult and cumbersome |