From CISO Marketplace — the hub for security professionals Visit

Data Protection Terms

331 terms

5G Edge Vulnerabilities

Security risks in distributed network architectures where high-speed data processing occurs outside centralized security…

Active Defense Mechanisms

Systems that dynamically respond to threats.

Adversary Emulation

The practice of mimicking specific threat actors' tactics and techniques for security testing.

AI-Powered Phishing Campaigns

Hyper-personalized social engineering attacks using behavioral analysis and content generation models.

API Security Gateway

A tool that monitors and secures API traffic, protecting against API-specific threats.

Asymmetric Cryptography

Encryption using paired public/private keys where data encrypted with one key requires the other for decryption.

Automated Reconnaissance

AI-powered tools scanning networks for vulnerabilities at machine speed using predictive analytics.

Automated Security Alerting

Systematic security notification.

Automated Security Assessment

Systematic evaluation of security measures.

Automated Security Configuration

Systematic security settings management.

Automated Security Control Testing

Systematic security validation.

Automated Security Metrics Collection

Systematic gathering of security data.

Automated Security Patch Management

Systematic update deployment.

Automated Security Remediation

Systematic fix of security issues.

Automated Security Reporting

Systematic security status communication.

Automated Security Status Reporting

Systematic security communication.

Automated Security Testing Flow

Systematic security validation process.

Automated Security Validation

Continuous testing of security controls.

Back Door

Hidden system access point bypassing normal authentication, often inserted during development.

Baselining

Establishing normal network/application behavior metrics to detect anomalies through continuous monitoring.

Behavioral Biometrics

Authentication systems analyzing unique patterns in user interactions (keystrokes, mouse movements).

Binary Analysis

The process of examining compiled software to determine its characteristics without access to source code.

Biometric Data

Physiological/behavioral characteristics (fingerprints, voice patterns) used for identity verification.

Botnet

A network of malware-infected devices controlled remotely for attacks like DDoS or spam campaigns.

Breach Impact Modeling

Analyzing potential consequences of security breaches.

Browser Isolation

A cybersecurity technique that physically isolates an internet user's browsing activity from their local network and inf…

BYOD

Policy allowing employee-owned devices for work, requiring additional mobile security controls for data protection.

CAASM

Technology that enables security teams to improve basic security hygiene by ensuring security controls.

CASB

Software that sits between cloud service users and cloud applications to monitor activity and enforce security policies.

Certified Information Systems Security Professional (CISSP)

Globally recognized certification demonstrating expertise in security program management.

Chain of Custody

Legal process documenting evidence handling for forensic investigations.

Chief Information Security Officer (CISO)

Executive responsible for enterprise-wide IT security strategy and compliance.

Common Criteria (CC)

International standard (ISO 15408) for evaluating security product effectiveness.

Communications Security (COMSEC)

Measures protecting telecommunications from interception/exploitation.

Computerized Provider Order Entry (CPOE)

Secure electronic system for transmitting medical treatment instructions.

Confidential Computing

Technologies that encrypt data in use, ensuring it remains protected during processing.

Continuous Security Validation

The ongoing process of testing security controls to ensure they remain effective.

Controlled Technical Information (CTI)

Technical data requiring export controls under ITAR/EAR regulations.

Controlled Unclassified Information (CUI)

Sensitive unclassified data requiring federal-mandated protection measures.

Cookie

Small website file storing user preferences and session data.

Credential Stuffing

A type of cyberattack where stolen account credentials are tested against multiple websites.

Cross-Border Data Transfer Framework

Rules governing international data movement.

Cryptanalysis

The science of breaking cryptographic systems by identifying weaknesses in encryption algorithms.

Cyber Asset Classification

Categorizing digital assets based on security requirements.

Cyber Asset Classification Framework

System for categorizing digital assets.

Cyber Asset Dependency Mapping

Identifying relationships between digital assets.

Cyber Asset Discovery

The process of identifying and cataloging all digital assets within an organization.

Cyber Asset Intelligence

The collection and analysis of information about an organization's digital assets.

Cyber Asset Inventory Management

Systems for tracking and managing an organization's digital assets.

Cyber Asset Lifecycle Management

Managing digital assets from acquisition through retirement.

Cyber Asset Management

The practice of maintaining an inventory of all digital assets and their security states.

Cyber Asset Monitoring

Continuous observation of digital asset security status.

Cyber Asset Risk Framework

System for evaluating digital asset risks.

Cyber Asset Risk Scoring

Assigning risk values to digital assets.

Cyber Asset Tagging

The process of labeling digital assets with security-relevant metadata.

Cyber Crisis Management

The process of handling major cybersecurity incidents and minimizing their impact.

Cyber Deception Technology

Tools that use decoys to misdirect and trap attackers, revealing their presence.

Cyber Defense Automation

Tools that automate security monitoring and response.

Cyber Defense Exercise

Simulated scenarios designed to test and improve security response capabilities.

Cyber Defense Matrix

A framework for organizing security tools and processes across different security domains.

Cyber Defense Planning

Developing strategies for protecting against cyber attacks.

Cyber Defense Simulation

Creating realistic scenarios for testing security defenses.

Cyber Evidence Collection

The systematic gathering of digital evidence for security investigations.

Cyber Hygiene Rating

A measure of how well an organization maintains its basic security practices.

Cyber Insurance

Insurance that helps organizations recover from cybersecurity incidents and data breaches.

Cyber Intelligence Fusion

Combining threat intelligence from multiple sources.

Cyber Kill Chain

A framework for understanding the stages of cyber attacks to better defend against them.

Cyber Physical Systems Security

Protection of systems where computer-based algorithms interact with physical components.

Cyber Physical Targeting

Attacks bridging digital and physical systems to disrupt industrial processes or critical infrastructure.

Cyber Range

A virtual environment used for cybersecurity training and software testing.

Cyber Range Assessment

Evaluating the effectiveness of security training environments.

Cyber Range Assessment Platform

Tools for evaluating security training effectiveness.

Cyber Range Automation

Tools and processes for automating cybersecurity training environments.

Cyber Range Exercise Design

Creating structured security training scenarios.

Cyber Range Infrastructure

The technical foundation for security training environments.

Cyber Range Orchestration

The automated setup and management of cybersecurity training environments.

Cyber Range Scenario Development

Creating realistic training scenarios for security teams.

Cyber Range Scenario Library

Collection of security training scenarios.

Cyber Range Simulation

Creating realistic scenarios for security training and testing.

Cyber Range Telemetry

Collection and analysis of data from cybersecurity training exercises.

Cyber Recovery

Specialized backup and recovery solutions designed to protect against cyber attacks.

Cyber Resilience

An organization's ability to maintain operations during/after cyber incidents through adaptive defenses and recovery pla…

Cyber Resilience

An organization's ability to prepare for, respond to, and recover from cyber attacks.

Cyber Risk Quantification

The process of evaluating and assigning numerical values to cyber risks.

Cyber Security Culture Program

Initiatives designed to promote security awareness and behavior throughout an organization.

Cyber Security Framework Mapping

The process of aligning security controls with various security frameworks.

Cyber Security Mesh Architecture

A composable and scalable approach to extending security controls across distributed assets.

Cyber Security Rating

A score that indicates an organization's security posture based on observable data.

Cyber Talent Gap

Critical shortage of skilled professionals capable of managing AI-enhanced security systems.

Cybersecurity Insurance

Coverage for breach-related costs including fines and legal fees.

Cybersecurity Maturity Model Certification (CMMC)

DoD framework assessing contractors' ability to safeguard defense-related data.

Dark Web

Unindexed internet segment often used for illegal data trading.

Darknets

Private encrypted networks requiring specific software/configurations, distinct from the broader dark web.

Data Breach

Unauthorized access/exposure of sensitive information like personal records or intellectual property.

Data Classification Framework

System for categorizing data sensitivity.

Data Controller

Entity determining purposes/methods of data processing.

Data Exfiltration Detection

Systems that monitor and flag unauthorized attempts to transfer sensitive data outside the organization.

Data Integrity Verification

Methods to ensure that data remains unaltered during storage and transmission.

Data Loss Prevention (DLP)

Technologies preventing unauthorized data exfiltration via endpoints/networks.

Data Loss Prevention (DLP) Innovations

Emerging technologies designed to prevent unauthorized data exfiltration and leaks.

Data Masking Strategies

Techniques to obscure sensitive information within data sets, ensuring privacy during non-production use.

Data Privacy Architecture

Structure for privacy implementation.

Data Processing Map

Visualization of data handling flows.

Data Processing Register

Documentation of data handling activities.

Data Processor

Third party processing data on controller's behalf.

Data Protection Impact Analysis

Assessment of data protection measures.

Data Protection Registry

Database of protection measures.

Data Retention Schedule

Timeline for data storage and deletion.

Data Subject Access Portal

Interface for privacy rights requests.

Data Transfer Impact Assessment

Evaluation of cross-border data movement risks.

Data Transfer Mechanism

Method for secure data movement.

Data-Centric Security Strategies

Approaches that focus on securing data directly, regardless of where it resides or how it is accessed.

Deepfake Social Engineering

Impersonation attacks using AI-generated voice/video to manipulate victims into unauthorized transactions.

Defense-in-Depth

Layered security strategy combining physical/technical/administrative controls across multiple system tiers.

Defensive Security Architecture

The structured approach to implementing security controls and countermeasures.

Defensive Surface Analysis

Evaluating the coverage and effectiveness of security controls.

DevSecOps

The practice of integrating security practices within the DevOps process.

Differential Privacy Techniques

Methods that introduce controlled noise into data analysis to protect individual identities.

Digital Supply Chain Risk

The potential cybersecurity risks that third-party vendors, suppliers, or service providers might introduce.

Distributed Security Operations

Security monitoring and response activities conducted across multiple locations.

DMARC

An email authentication protocol designed to prevent email spoofing.

Edge Computing Security

Protecting distributed computing environments at the network's edge.

Endpoint Security

Protecting devices (computers/mobiles) with antivirus and intrusion detection.

Enterprise Risk Management (ERM)

Holistic strategy identifying/prioritizing organizational cyber risks.

Ethical Hacking

Authorized system penetration testing to identify vulnerabilities.

EULA

License agreement outlining software usage terms/data practices.

Federal Information Security Management Act (FISMA)

US legislation requiring federal agencies to implement security programs.

FedRAMP

US government program standardizing cloud service provider security assessments.

Firmware Integrity Verification

Processes to confirm that firmware has not been tampered with and remains authentic during its lifecycle.

Firmware Security

Protecting the low-level software that provides hardware control and basic operation instructions.

FISMA

US law mandating federal agencies implement information security programs.

FOIA

US law enabling public access to government records.

GDPR

EU regulation governing personal data handling, emphasizing transparency and user rights.

Generative Adversarial Defense

AI systems trained to anticipate novel attack vectors by simulating attacker methodologies.

Greylist

Temporary block/allow list requiring additional verification.

Greylist

Temporary blocklist requiring additional verification (e.g., email sender authentication) before allowing access.

Hardening Benchmark

A set of security recommendations for a specific technology product or platform.

Hardware Security Module

A physical computing device that safeguards and manages digital keys for strong authentication.

Health Insurance Portability and Accountability Act (HIPAA)

US law mandating safeguards for protected health information (PHI).

Honeypot

Decoy system designed to attract and study cyberattack methods.

Immutable Data Storage Solutions

Storage systems that guarantee data, once written, cannot be modified or erased.

Information Security Management System (ISMS)

ISO 27001-aligned framework for maintaining data confidentiality/integrity.

Insider Data Exfiltration Prevention

Strategies focused on detecting and stopping the unauthorized transfer of sensitive data from within an organization.

IPsec

Protocol suite securing internet communications through encryption and authentication.

ISO/IEC 27001

International standard for implementing information security management systems.

IT/OT Convergence Security

Protection frameworks for integrated industrial control systems (OT) and enterprise networks (IT) in smart factories.

Juice Jacking

Malicious USB charging stations stealing device data.

Juice Jacking

Malicious USB charging ports that install malware or steal data from connected devices.

KMS

System generating/storing cryptographic keys securely.

LDAP

Protocol for accessing directory services in networked environments.

Library Security Framework

Protection for information repositories.

Log Management

Systematic collection/analysis of system logs to detect anomalies and support forensic investigations.

Malvertising

Malware distribution through compromised online advertisements on legitimate websites.

MFA

Multi-factor authentication using ≥2 verification methods.

Microsegmentation

A security technique that enables fine-grained security policies to be assigned to data center applications.

Moving Target Defense (MTD)

Dynamic security approach that continuously alters network configurations to disrupt attacker reconnaissance.

NIST Cybersecurity Framework (CSF)

Risk management guidelines with six core functions for organizational resilience.

NIST Framework

Cybersecurity guidelines for risk management.

OAuth

Open standard allowing secure delegated access without sharing passwords.

Offensive Security Engineering

The practice of building security tools and techniques for authorized system testing.

Onion Routing

Layered encryption technique enabling anonymous communication.

Open Web Application Security Project (OWASP)

Community-driven initiative improving software security through best practices.

OWASP

Open community improving software security.

Penetration Testing

Simulated cyberattacks to evaluate system defenses.

Penetration Testing

Simulated cyberattacks evaluating defensive capabilities.

Pharming

Redirecting users to fake sites to steal credentials.

Phishing

A cybercrime where targets are contacted by email, phone or text by someone posing as a legitimate institution.

Phishing

Fraudulent attempts to obtain sensitive data by impersonating legitimate entities.

Post-Quantum Cryptography

Next-gen encryption standards being standardized by NIST to counter quantum computing threats.

Privacy Architecture Pattern

Reusable privacy design structure.

Privacy by Design Principles

Integrating robust privacy protections into the design and architecture of systems from the outset.

Privacy Consent Management

Systems for handling user privacy permissions.

Privacy Control Assessment

Evaluation of privacy protection measures.

Privacy Control Framework

Structure for privacy protection.

Privacy Enhancing Protocol

Standard for privacy improvement.

Privacy Enhancing Technologies

Tools and techniques designed to protect personal data and enable privacy compliance.

Privacy Impact Assessment (PIA)

Analysis evaluating data processing risks under regulations like GDPR.

Privacy Impact Assessment (PIA)

Systematic analysis of privacy risks.

Privacy Impact Monitoring

Tracking privacy measure effectiveness.

Privacy Metric Dashboard

Visual display of privacy performance.

Privacy Notice Management

Handling of privacy policy communications.

Privacy Policy Generator

Automated privacy notice creation tool.

Privacy Rights Automation

Automated handling of privacy requests.

Privacy Rights Management

Systems for handling privacy-related requests.

Privacy Sandbox Implementation

Isolated environment for privacy testing.

Privacy-by-Design Framework

Building privacy into system architecture.

Privacy-Preserving Computation

Technologies enabling data processing while maintaining privacy.

Privacy-Preserving Data Analytics

Techniques for extracting insights from data sets while protecting individual privacy.

Pseudonymization

Data protection method replacing identifiers with artificial values.

Purple Teaming

A security methodology that combines red team and blue team functions to maximize cybersecurity effectiveness.

Qualified Security Assessor (QSA)

PCI DSS-certified professional conducting compliance validations.

Quantum Cryptography

Encryption using quantum mechanics principles.

Quantum Cryptography

The science of exploiting quantum mechanical properties to secure the transmission of data.

Quantum-Resistant Cryptography

Encryption methods designed to withstand decryption attempts by quantum computers using lattice-based or hash-based algo…

RASP

Security technology that's embedded into an application to detect and block attacks in real-time.

Red Team Automation

Tools and processes that automate penetration testing and security assessment activities.

Regulatory Fragmentation

Challenges complying with conflicting cybersecurity laws across different jurisdictions.

Risk Assessment

Methodical evaluation of threats and vulnerabilities to prioritize mitigations.

Root Certificate

Foundational digital certificate establishing trust hierarchies for SSL/TLS encryption chains.

Rootkit

Malware granting privileged access while hiding presence.

Runtime Security

Protection mechanisms that operate while software is executing.

Sandboxing

Isolating untrusted programs in restricted environments.

SASE

A network architecture that combines network security functions with WAN capabilities to support secure access needs of …

SCAP

A method for using specific standards to enable automated vulnerability management.

Secure API Development Lifecycle

Integrating security best practices throughout the development, testing, and deployment of APIs.

Secure Boot Verification

A process that ensures a device boots using only software trusted by the manufacturer, preventing unauthorized code exec…

Secure Data Tokenization

The process of replacing sensitive data elements with non-sensitive placeholders to mitigate risk.

Secure Email Gateway

Technology that prevents mission-critical email data from being corrupted, stolen, or lost.

Secure Web Gateway

Security solutions that prevent unsecured internet traffic from entering an organization's network.

Security Architecture Assessment

Evaluating the effectiveness of security control placement.

Security Architecture Assessment Framework

Structured approach to evaluating security designs.

Security Architecture Blueprint

Detailed plan for security control implementation.

Security Architecture Documentation

Recording and maintaining security control implementations.

Security Architecture Modeling

The process of creating representations of security control implementations.

Security Architecture Pattern

Reusable solutions to common security design problems.

Security Architecture Pattern Library

Collection of reusable security design solutions.

Security Architecture Reference Model

Standard templates for security control implementation.

Security Architecture Review Board

A governance body that evaluates and approves security architecture decisions.

Security Architecture Template

Standardized security design patterns.

Security Assurance Level

A measure of confidence that security features and architecture meet security requirements.

Security Awareness Training

Programs designed to educate users about cybersecurity best practices and potential threats.

Security Baseline Assessment

Evaluating systems against established security standards.

Security Baseline Configuration

A documented set of specifications for system components.

Security Baseline Deviation

Measuring variations from security standards.

Security Baseline Management

Maintaining security standards.

Security Champion

Individuals embedded within development teams who promote security practices and culture.

Security Chaos Engineering

The practice of intentionally introducing security failures to test system resilience.

Security Configuration Assessment

Evaluating system settings against security best practices.

Security Configuration Management

The practice of handling security settings across systems and keeping them in a secure state.

Security Context Analysis

The process of understanding the security implications of a specific situation or environment.

Security Control Assessment

The testing or evaluation of security controls to determine their effectiveness.

Security Control Attestation

Verification of security control implementation.

Security Control Auditing

Examining security measures for compliance and effectiveness.

Security Control Catalog

Comprehensive list of security measures.

Security Control Deployment Strategy

Plan for implementing security measures.

Security Control Documentation

Recording security measure details.

Security Control Effectiveness Metrics

Measurements of how well security controls perform.

Security Control Effectiveness Rating

Measuring security measure success.

Security Control Exception Handling

Managing security requirement deviations.

Security Control Exception Process

Managing deviations from security standards.

Security Control Framework Alignment

Mapping security controls to multiple compliance frameworks.

Security Control Gap Analysis

Identifying missing security measures.

Security Control Implementation

The process of deploying and configuring security measures.

Security Control Implementation Guide

Detailed instructions for deploying security measures.

Security Control Implementation Strategy

Plan for deploying security measures.

Security Control Inheritance

The process by which security controls are passed down from parent to child systems.

Security Control Inheritance Analysis

Evaluating how security controls propagate through systems.

Security Control Inheritance Chain

Tracking propagation of security controls.

Security Control Lifecycle

The evolution of security controls from implementation to retirement.

Security Control Lifecycle Management

Managing security measure evolution.

Security Control Mapping

Aligning security controls across different compliance frameworks.

Security Control Matrix

Organized view of security measures across an environment.

Security Control Monitoring System

Tracking security measure status.

Security Control Orchestration Platform

Tools that automate the deployment and management of security controls across environments.

Security Control Rollback Plan

Procedure for reverting security changes.

Security Control Testing

Validating the implementation of security measures.

Security Control Testing Strategy

Plan for validating security measures.

Security Control Validation

The process of testing security controls against real-world attack scenarios.

Security Control Variance Analysis

Studying differences in control implementation.

Security Control Version Control

Managing security control changes.

Security Data Classification

Categorizing data based on sensitivity and protection requirements.

Security Data Governance

The management of security-related data throughout its lifecycle.

Security Data Lake

A centralized repository for storing security-related data for analysis.

Security Debt Management

Tracking and addressing accumulated security issues.

Security Dependency Analysis

Evaluating security risks in software dependencies.

Security Design Review

The process of evaluating system designs for potential security issues.

Security Development Lifecycle

A process for implementing security best practices in software development.

Security Impact Analysis

The process of determining how changes might affect system security.

Security Knowledge Management

The practice of collecting, organizing, and sharing security-related information.

Security Log Aggregation

The process of collecting and centralizing security-related log data from multiple sources.

Security Mesh

A collaborative ecosystem of security tools working together to improve overall security posture.

Security Mesh Architecture

A distributed architectural approach to scalable, flexible, and reliable cybersecurity control.

Security Metric Threshold

Defined limits for security measurements.

Security Metrics Analysis

Evaluating security performance data for insights.

Security Metrics Collection

The gathering and organization of security performance data.

Security Metrics Collection Platform

Tools for gathering security performance data.

Security Metrics Correlation

Finding relationships between security measurements.

Security Metrics Dashboard

A visual interface showing key security performance indicators.

Security Metrics Dashboard Platform

Tools for visualizing security performance data.

Security Metrics Reporting Framework

Structure for communicating security performance.

Security Metrics Visualization

Creating visual representations of security performance data.

Security Operations Center

A centralized unit that deals with security issues on an organizational and technical level.

Security Operations Center (SOC)

Team monitoring networks for threats using SIEM and EDR tools.

Security Parameter Analysis

Evaluating the effectiveness of security settings.

Security Parameter Baseline

Standard security settings for systems and applications.

Security Parameter Configuration

Setting up security controls according to best practices.

Security Parameter Optimization

The process of fine-tuning security controls for maximum effectiveness.

Security Parameter Optimization Platform

Tools for fine-tuning security settings.

Security Parameter Profile

Predefined sets of security settings for specific use cases.

Security Parameter Testing

Evaluating the effectiveness of security control settings.

Security Parameter Testing Framework

Structured approach to evaluating security settings.

Security Parameter Tuning

Adjusting security settings for optimal performance.

Security Performance Analytics

Analysis of security effectiveness.

Security Performance Baseline

Reference point for security measurements.

Security Performance Dashboard

Visual security status display.

Security Performance Metrics

Measurements used to evaluate the effectiveness of security programs.

Security Performance Monitoring

Tracking security effectiveness.

Security Performance Optimization

Improving security effectiveness.

Security Posture

An organization's overall cybersecurity strength and how well it can predict, prevent and respond to cyber threats.

Security Posture Scoring

Quantitative assessment of overall security strength.

Security Requirements Engineering

The process of determining and documenting security needs for systems.

Security Resource Planning

The process of allocating resources to maintain and improve security posture.

Security Risk Assessment Framework

A structured methodology for analyzing and managing cybersecurity risks.

Security Risk Assessment Matrix

Framework for evaluating risks.

Security Risk Quantification Model

Framework for measuring security risks.

Security Risk Trend Analysis

Studying patterns in security risks.

Security Scorecard

A tool that measures and reports on an organization's security posture.

Security Service Edge

Cloud-based security services that provide secure access to websites, SaaS applications and private applications.

Security Telemetry Analysis

Processing and analyzing security monitoring data.

Security Testing as a Service

Subscription-based security testing services delivered via cloud platforms.

Security Tokenization

The process of replacing sensitive data with unique identification symbols that retain essential information.

Service Organization Control (SOC) Report

Audit document detailing cloud providers' security controls.

SIEM

Systems that collect and analyze security data to detect threats.

SOAR

Technology solutions that allow organizations to collect security data and alerts from different sources.

SOC

Security Operations Center monitoring/responding to threats.

Software Composition Analysis

Tools that analyze open-source software components for security vulnerabilities.

STIG

Configuration standards for securing hardware and software systems.

Synthetic Data Generation Security

Creating artificial datasets for testing purposes without exposing real, sensitive information.

System and Organization Controls (SOC 2)

Audit framework evaluating service providers' data security controls.

Tailgating

Physical security breach where unauthorized personnel follow authorized users into restricted areas.

Third-Party Risk Management (TPRM)

Processes assessing vendor security postures and compliance.

Tokenization

Replacing sensitive data with non-sensitive tokens.

Trusted Execution Environments

Isolated environments within a processor that guarantee the integrity and confidentiality of code and data during execut…

Wearable Device Privacy Protection

Techniques aimed at protecting sensitive personal data collected by wearable technologies.

Whitelisting

Allowing pre-approved applications/entities system access.

XDR

A unified security solution that automatically collects and correlates data from multiple security layers.

XSS

Cross-site scripting attacks injecting malicious code into websites.

Zero Trust

Security model requiring continuous verification for access.

Zero Trust Architecture (ZTA)

Security model requiring continuous verification of all users/devices regardless of network location.

Zero Trust Architecture (ZTA)

Security model requiring continuous verification for all access requests.

Zero-Day Protection

Security measures designed to prevent exploitation of previously unknown vulnerabilities.