An example of platform-as-a service (PaaS) computing that allows customers to upload their own code functions to the provider; the provider will then execute those functions on a scheduled basis, in response to events, and/or on demand. *What does this acronym stand for?*
A measurement of the amount of damage or loss that could be or will be caused if a potential threat is realized.
A cryptographic analysis or attack that looks for repetition of letters in an encrypted message and compares that with the statistics of letter usage for a
specific language, such as the frequency of the letters E, T, A, 0 , N, R, I, S, and H in the English language.
Software that manages the access of virtual machines to underlying hardware resources
A form of computer-management device that controls industrial processes and machines. ICSs are used across a wide range of industries, including manufacturing, fabrication, electricity generation and distribution, water distribution, sewage processing, and oil refining. *What does this acronym stand for?*
A type of proxy that is placed between clients and servers, and that accepts requests from clients and sends them forward to servers.
A framework that contains a series of documents
designed to describe the organization's cybersecurity program.
European Union law that provides a single, harmonized law covering data security and privacy. *What does this acronym stand for?*
A key principle in social engineering that relies on you liking the individual or
even the organization the individual is claiming to represent.
U.S. law passed in 1999 that eased the strict governmental barriers between financial institutions and created new security and privacy requirements. *What does this acronym stand for?*
Risks that originate from a source outside the organization.