| 1 | Confidentiality | | _____ | Ease of use for users diminishes |
| 2 | Information Warfare | | _____ | An event involving the exposure of information to entities not authorized access to the information |
| 3 | Data Modification | | _____ | Get the private information (pin number/password) without any permission |
| 4 | Open Security Model | | _____ | The easiest to implement |
| 5 | Data Disclosure | | _____ | Delete files unfortunately |
| 6 | Closed Security Model | | _____ | May involve collection of tactical information to demoralize the enemy and the public |
| 7 | Information Theft | | _____ | Modify information that an attacker is not authorized to modify |
| 8 | Unauthorized Disclosure | | _____ | protecting information from being modified by unauthorized parties |
| 9 | Integrity | | _____ | Confidentiality is the protection of personal information. |
| 10 | Accidental Data Loss | | _____ | the information must be available when it is needed. |
| 11 | Restrictive Security Model | | _____ | Voluntary sharing of any and all information that is considered relevant to a given situation |
| 12 | Availabilty | | _____ | Products and services that ensure that data continue to be available |
| 13 | Data Availability | | _____ | User access is difficult and cumbersome |