Difference between revisions of "Cyberattack/Preparation"
Jump to navigation
Jump to search
(sections) |
m (Jun moved page Cyber attack/Preparation to Cyberattack/Preparation: Spell) |
Latest revision as of 13:47, 1 November 2022
Cyberattack/Preparation (Disaster/Preparation, Supply chain/Control) | |
---|---|
Preparation for Cyber attacks includes "simulations" to recognize "central points of vulnerability" |
Preparation for Cyber attacks includes "simulations" and planning exercises of "central points of vulnerability".[1]
IT infrastructure
The worldwide IT infrastructure is supplied with rather uniform hardware and software.
Windows
- Full article: Windows
- Full article: Windows
Most of the IT infrastructure in big companies runs the Microsoft Windows operating system. Windows and software that runs on it needs constantly fixing for security flaws.
Hardware backdoor
- Full article: backdoor
- Full article: backdoor
Processors and UEFI have undocumented security flaws which may be intentional backdoors.[2]
An example
Page name | Description |
---|---|
Cyber Polygon 2020 | tabletop exercise on cyber security of the financial system |
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.