How security duties are divided between a cloud provider and its customers.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A virtualized WAN architecture.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The monitoring, configuration updating and troubleshooting of devices from a remote location.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The capability of a system to continue operating correctly despite component failures.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The practice of intentionally disrupting systems in controlled experiments.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    An incorrect or insecure system, software or network setting.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A software update that modifies existing code to fix security vulnerabilities.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A cryptographic credential that replaces passwords.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A cloud-based model that provides managed database systems.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A cloud-based model that replicates and hosts virtual or physical servers.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A cloud-based model in which a provider stores customers’ data backups remotely.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Software whose source code is proprietary and not publicly available for modification.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    An organization that sells cloud-based services for customers.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The time between a user’s request and the system’s response.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The networked integration of industrial machinery, sensors and software systems.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A computer-based system that perceives data, reasons or learns from it.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The systems that support the operation of IT services.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A cloud vendor that operates large-scale, globally distributed infrastructure.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The processing capacity of computer systems used to run applications.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A facility that houses computing, storage and networking infrastructure.