An advanced persistent threat (APT) is a set of stealthy and continuous computer hacking processes, often orchestrated by human(s) targeting a specifi...
Information security incidents are defined as a single or series of unwanted events that compromise (or are likely to compromise) the confidentiality,...
Disaster recovery (DR) involves a set of policies, procedures, systems and organization to enable the recovery or continuation of vital technology inf...
The OIST configuration management database (CMDB) is a repository that stores information regarding IT assets, as well as descriptive relationships be...