Delivery of storage or computing services from remote servers online (ie via the internet).
Data that requires extra sensitivity due to the significant potential for misuse and costly reporting requirements in the event of unauthorized access.
Ensuring that information is not made available or disclosed to unauthorized individuals, entities, or processes.
Activities that, through the use of cyberspace, actively gather information from computers, information systems, or networks, or manipulate, disrupt, deny, degrade, or destroy targeted computers, information systems, or networks.
An organization's ability to continuously deliver the intended outcome despite adverse cyber events.