Threat Arena: Principles Challenge

Tactical Inventory

Authorized Access Only
Data remains unaltered
System is up and running
Information is useful
Physical control of media
Origin is verified

The Arena

Confidentiality

Integrity

Availability

Utility

Possession

Authenticity