This technology is the foundation of cryptocurrencies
What is blockchain?
This involves managing digital identities and their access privileges
What is identity management?
This process assesses the potential impacts of disruptive events
What is business impact analysis?
This system detects and prevents intrusions
What is an IPS (Intrusion Prevention System)?
This outlines the introduction of mobile devices into organizations
What are mobile device deployment methods?
This cryptocurrency is widely recognized
What is Bitcoin?
These are the various categories of uncertainties leading to harm
What are risk types?
These plans ensure business operations continue after disruptions
What are business continuity plans?
This integrates threat intelligence and automates response actions
What is SOAR (Security Orchestration, Automation, and Response)?
This solution manages mobile device applications and data securely
What is mobile device management (MDM)?
This platform enables the execution of smart contracts
What is Ethereum?
This method employs specific data for risk assessment
What are quantitative risk calculations?
These plans focus on restoring business functions post-incident
What are disaster recovery plans?
This technology provides solutions against mobile device threats
What is mobile threat defence (MTD)?
This offers a comprehensive approach to mobile device management
What is enterprise mobility management?
These are automated contracts on the blockchain
What are smart contracts?
This is where identified risks and their mitigation strategies are recorded
What is a risk register?
This defines the acceptable time to restore a function after a disaster
What is recovery time objective?
This involves managing and mitigating security incidents or breaches
What is incident response?
This is how Apple's mobile OS caters to business needs
What is iOS in the enterprise?
This consensus mechanism is based on the amount of cryptocurrency held
What is Proof of Stake (PoS)?
This is the maximum acceptable downtime for a process
What is maximum tolerable downtime?
At this point in time, data must be recovered following an incident
What is recovery point objective?
This is how the security of mobile devices and data is managed
What is mobile device management (MDM)?
This describes bypassing device restrictions on mobile phones
What is rooting and jailbreaking?