Activity in which key personnel assigned emergency management roles and responsibilities are gathered to discuss, in a non-threatening environment, various simulated emergency situations.
A person, object, or place selected as the aim of an attack.
The process of analyzing and controlling risks presented to your company, your data, your operations and your finances by parties other than your own company.
Something that could cause harm to a system or organization.
A person who performs a cyber attack or causes an accident.
Malicious programs that pretend to be legitimate software, but actually carry out hidden, harmful functions.
Obtaining evidence of identity by two independent means, such as knowing a password and successfully completing a smartcard transaction.