Adequate SecurityAdministrative ControlsAdverse EventsApplication Programming Interface (API)Application ServerArtificial IntelligenceAssetAsymmetric EncryptionAuditAuthenticationAuthorizationAvailabilityBaselineBiometricBitBotBreachBroadcastBusiness Continuity (BC)Business Continuity Plan
... [Show More]
(BCP)
Business Impact Analysis (BIA)
Byte
Checksum
Ciphertext
Classification
Classified or Sensitive Information
Cloud Computing
Community Cloud
Confidentiality
Configuration Management
[Show Less]