A type of malicious software that cybercriminals use to extort money from their victims.
An independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view.
The recovery of data following computer failure or loss.
Possibility of something that could cause an organization not to meet one of its objectives.
The process of identifying, analysing and evaluating risk.