An advanced persistent threat (APT) is a set of stealthy and continuous computer hacking processes, often orchestrated by human(s) targeting a specifi...
Information security incidents are defined as a single or series of unwanted events that compromise (or are likely to compromise) the confidentiality,...
Disaster recovery (DR) involves a set of policies, procedures, systems and organization to enable the recovery or continuation of vital technology inf...
The OIST configuration management database (CMDB) is a repository that stores information regarding IT assets, as well as descriptive relationships be...
Malware is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or displ...