A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
The downtime or unavailability of a specific software application due to a cyber incident.
The breakdown (or misconfiguration) of mechanisms designed to regulate user permissions, allowing unauthorised system or data access.
The compromise and unathorised use of legitimate user credentials to access systems or conduct fraudulent activities.
The total ceiling on what the insurer will pay across multiple claims in a policy period.
A vendor pre-authorised or endorsed by the insurer to perform response services.