Difference between revisions of "Cyberattack/Preparation"

From Wikispooks
Jump to navigation Jump to search
(Created page with "{{concept |wikipedia= |constitutes=Disaster/Preparation, Supply chain/Control |interests= |description=Preparation for Cyber attacks includes "simulations" to recognize "c...")
 
Line 3: Line 3:
 
|constitutes=Disaster/Preparation, Supply chain/Control
 
|constitutes=Disaster/Preparation, Supply chain/Control
 
|interests=
 
|interests=
|description=Preparation for Cyber attacks includes "[[simulations]]" to recognize "central points of vulnerability"
+
|description=Preparation for Cyber attacks includes "[[simulation]]s" to recognize "central points of vulnerability"
 
}}
 
}}
 
Preparation for '''Cyber attacks''' includes "[[simulation]]s" and [[planning exercises]] of "central points of vulnerability".<ref>  
 
Preparation for '''Cyber attacks''' includes "[[simulation]]s" and [[planning exercises]] of "central points of vulnerability".<ref>  

Revision as of 19:45, 26 December 2021

Concept.png Cyberattack/Preparation
(Disaster/Preparation,  Supply chain/Control)Rdf-entity.pngRdf-icon.png
Preparation for Cyber attacks includes "simulations" to recognize "central points of vulnerability"

Preparation for Cyber attacks includes "simulations" and planning exercises of "central points of vulnerability".[1]


 

An example

Page nameDescription
Cyber Polygon 2020tabletop exercise on cyber security of the financial system
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References


57px-Notepad icon.png This is a page stub. Please add to it.