CISA
Cybersecurity and Infrastructure Security Agency
Illicit and hidden. A clandestine operation depends for its success upon not being detected, because if detected it would immediately be recognized for what it is. Landing a team of...
A cyberattack technique in which a user is induced to click on an apparently benign link that in fact carries them to a malicious site, installs malware, or performs some...
A form of phihing in which a legitimate, delivered, email including an attachment or link has been copied and used to create an almost identical, but now malicious, copy or...
Internet-based computer storage and operations, conducted on the Internet as opposed to local devices.
Referring to application development based on containers, microservices, and dynamic orchestration, all managed on an elastic infrastructure via agile DevOps and continuous delivery.
The mechanism by which cloud service providers assure cloud consumers of the security, privacy, and integrity of the consumers’ data. The artifacts that provide this assurance are known as “elements...