To make a copy of data stored on a computer or server to lessen the potential impact of failure or loss.
A group of individuals who perform an analysis of information systems to ensure security, identify security flaws, verify the effectiveness of each security measure, and to make certain all security measures will continue to be effective after implementation.
A number of internet-connected devices controlled by a malicious actor using command & control (C&C) software to execute tasks which may steal data, send spam, or perform a distributed denial-of-service attack (DDoS attack).
Bring Your Own Device (BYOD)
The authorized use of personally owned mobile devices such as smartphones or tablets in the workplace.