||Like other important assets, an asset which offer organization value and continuously requires the proper protection
||Ensuring information is accessible only to those authorized to have access
||Safeguarding the accuracy and completeness of information and processing methods
||Ensuring only authorized users have access to information and associated assets when required
||Risk that affects on assets though weakness/loophole, vulnerability itself is not harmful.
||Potential risk that causes vulnerability, brining damage in an asset or information asset group
||Assessment of threats to, impacts on and vulnerabilities of information and information processing facilities and the likelihood of their occurrence.
||Process of identifying, controlling and minimizing or eliminating security risks that may affect information systems, for an acceptable cost.. ISMS - Information System Management System