Difference between revisions of "Cyberattack/Preparation"
Jump to navigation
Jump to search
(Created page with "{{concept |wikipedia= |constitutes=Disaster/Preparation, Supply chain/Control |interests= |description=Preparation for Cyber attacks includes "simulations" to recognize "c...") |
m (Jun moved page Cyber attack/Preparation to Cyberattack/Preparation: Spell) |
||
(3 intermediate revisions by 2 users not shown) | |||
Line 3: | Line 3: | ||
|constitutes=Disaster/Preparation, Supply chain/Control | |constitutes=Disaster/Preparation, Supply chain/Control | ||
|interests= | |interests= | ||
− | |description=Preparation for Cyber attacks includes "[[ | + | |description=Preparation for Cyber attacks includes "[[simulation]]s" to recognize "central points of vulnerability" |
}} | }} | ||
Preparation for '''Cyber attacks''' includes "[[simulation]]s" and [[planning exercises]] of "central points of vulnerability".<ref> | Preparation for '''Cyber attacks''' includes "[[simulation]]s" and [[planning exercises]] of "central points of vulnerability".<ref> | ||
https://www.thelastamericanvagabond.com/another-mega-group-spy-scandal-samanage-sabotage-and-the-solarwinds-hack/ | https://www.thelastamericanvagabond.com/another-mega-group-spy-scandal-samanage-sabotage-and-the-solarwinds-hack/ | ||
</ref> | </ref> | ||
+ | |||
+ | ==IT infrastructure== | ||
+ | The worldwide IT infrastructure is supplied with rather uniform hardware and software. | ||
+ | |||
+ | ===Windows=== | ||
+ | {{FA|Windows}} | ||
+ | Most of the IT infrastructure in big companies runs the [[Microsoft]] Windows [[operating system]]. Windows and software that runs on it needs constantly fixing for security flaws. | ||
+ | |||
+ | ===Hardware backdoor=== | ||
+ | {{FA|backdoor}} | ||
+ | Processors and UEFI have undocumented security flaws which may be intentional [[backdoors]].<ref>[https://www.youtube.com/watch?v=jmTwlEh8L7g DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86]</ref> | ||
{{SMWDocs}} | {{SMWDocs}} |
Latest revision as of 13:47, 1 November 2022
Cyberattack/Preparation (Disaster/Preparation, Supply chain/Control) | |
---|---|
Preparation for Cyber attacks includes "simulations" to recognize "central points of vulnerability" |
Preparation for Cyber attacks includes "simulations" and planning exercises of "central points of vulnerability".[1]
IT infrastructure
The worldwide IT infrastructure is supplied with rather uniform hardware and software.
Windows
- Full article: Windows
- Full article: Windows
Most of the IT infrastructure in big companies runs the Microsoft Windows operating system. Windows and software that runs on it needs constantly fixing for security flaws.
Hardware backdoor
- Full article: backdoor
- Full article: backdoor
Processors and UEFI have undocumented security flaws which may be intentional backdoors.[2]
An example
Page name | Description |
---|---|
Cyber Polygon 2020 | tabletop exercise on cyber security of the financial system |
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.