Difference between revisions of "Cyberattack/Preparation"
Jump to navigation
Jump to search
(windows) |
|||
Line 8: | Line 8: | ||
https://www.thelastamericanvagabond.com/another-mega-group-spy-scandal-samanage-sabotage-and-the-solarwinds-hack/ | https://www.thelastamericanvagabond.com/another-mega-group-spy-scandal-samanage-sabotage-and-the-solarwinds-hack/ | ||
</ref> | </ref> | ||
+ | |||
+ | ==Windows== | ||
+ | {{FA|Windows}} | ||
+ | Most of the IT infrastructure in big companies runs the [[Microsoft]] Windows [[operating system]]. Windows and software that runs on it needs constantly fixing for security flaws. | ||
{{SMWDocs}} | {{SMWDocs}} |
Revision as of 22:22, 11 January 2022
Cyberattack/Preparation (Disaster/Preparation, Supply chain/Control) | |
---|---|
Preparation for Cyber attacks includes "simulations" to recognize "central points of vulnerability" |
Preparation for Cyber attacks includes "simulations" and planning exercises of "central points of vulnerability".[1]
Windows
- Full article: Windows
- Full article: Windows
Most of the IT infrastructure in big companies runs the Microsoft Windows operating system. Windows and software that runs on it needs constantly fixing for security flaws.
An example
Page name | Description |
---|---|
Cyber Polygon 2020 | tabletop exercise on cyber security of the financial system |
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.