· Protection of information
and property from theft,corruption,or natural disaster, while allowing the information
and property to remain accessible and productive to its intended users.
· Processes and mechanisms
by which sensitive and valuable information and services are protected from publication,
tampering or collapse by unauthorized activities or untrustworthy individuals and
unplanned events respectively.