COMPLETE SOLUTIONS GRADED A++
Encryption
Preventive control for data confidentiality and privacy
Authentication
Process to establish information origin or user identity
Data Breach
Unauthorized access compromising sensitive information
Vulnerabilities
Weaknesses in systems that can be exploited
System Availability
Ensuring systems are operational when needed
Disaster Recovery
Plans to restore operations after a catastrophe
Business Continuity
Maintaining essential functions during disruptions
Cyberattacks
Malicious attempts to disrupt or gain unauthorized access
Confidentiality
Protecting data from unauthorized access
Integrity