The degree to which a component or system protects its data and resources against unauthorized access or use and secures unobstructed access and use for its legitimate users.
The degree to which a component or system protects its data and resources against unauthorized access or use and secures unobstructed access and use for its legitimate users.