Table of Content

CIA Triad form the foundation security

Confidentiality

Integrity

Availability

Vulnerability, Exploit, Threat, Mitigation