A field concerned with designing and developing artificial intelligence algorithms for automated knowledge discovery and innovation by information systems.
A field concerned with designing and developing artificial intelligence algorithms for automated knowledge discovery and innovation by information systems.
A type of malicious code that attaches itself to documents and uses the macro programming capabilities of the document’s application to execute, replicate, and spread or propagate itself.
A small application program that is automatically downloaded and executed and that performs an unauthorized function on an information system.
Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system. Includes software, firmware, and scripts.
Hardware, firmware, or software that is intentionally included or inserted in a system to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.
Software that compromises the operation of a system by performing an unauthorized function or process. Synonym(s): malicious code, malicious applet, malicious logic
A method of creating zones in data centers and cloud environments to isolate workloads from one another and secure them individually. With microsegmentation, system administrators can create policies that limit network traffic between workloads based on a Zero Trust approach. Security policies are an essential enabler of microsegmentation.
The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences.Implementing appropriate risk-reduction controls based on risk management priorities and analysis of alternatives.
The presentation of a dynamic attack surface, increasing an adversary's work factor necessary to probe, attack, or maintain presence in a cyber target.
The use of multiple cloud computing and storage services – for example Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), in a single heterogeneous architecture. This also refers to the distribution of cloud assets, software, applications, etc. across several cloud-hosting environments. With regard to security policy, it is important to design and deploy policies that can be enforced across all relevant cloud platforms/services utilized.