This document discusses key concepts in information security architecture and risk management. It begins with an overview of the general attack process and definitions of architecture. It then covers security architecture principles like defense in depth, the security triad of confidentiality, integrity and availability. The document defines risk management terms and frameworks. It also outlines the security roles and responsibilities of different stakeholders like the board of directors and security practitioners.