Is the proper handling of sensitive data, specifically personal information, communication, and conduct generated and transmitted within digital environments.
The process of transforming information in a way that, ideally, only authorized parties can decode.
Is any software that is intentionally designed to cause disruption to a computer, server, client, or computer network.
A form of scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, or ransomware
A statement or legal document that discloses some or all the way a party gathers, uses discloses, and manages a customer or client's data.
A type of malicious software or malware that prevents you from accessing your computer files, systems, or networks and demands you to pay a ransom for their return.
A manipulation technique that exploits human error
An overlay network that uses network virtualization to extend a private network across a public network, such as the internet, via encryption.