Begriffe

Non-Fungible Tokens
Operational Technology
Patch
Penetrationstest
Phishing
Pretexting, Identitätsdiebstahl
Proxy
Radio-Frequency Identification
Reinforcement Learning
Remote Access Trojaner
Remote Code Execution
Remote Desktop Protocol
Risikoappetit (Risikoneigung / Risikobereitschaft)
Risikomanagement
Schadfunktion
Secure Access Service Edge
Secure Web Gateway
Spam
Speicherprogrammierbare Steuerung
Spyware
Supervisory Control and Data Acquisition
Trojanisches Pferd, Trojaner
Vertraulichkeit
Virtual Local Area Network
Virtual Private Network