Difference between revisions of "Cyberattack/Preparation"
Jump to navigation
Jump to search
(Created page with "{{concept |wikipedia= |constitutes=Disaster/Preparation, Supply chain/Control |interests= |description=Preparation for Cyber attacks includes "simulations" to recognize "c...") |
|||
Line 3: | Line 3: | ||
|constitutes=Disaster/Preparation, Supply chain/Control | |constitutes=Disaster/Preparation, Supply chain/Control | ||
|interests= | |interests= | ||
− | |description=Preparation for Cyber attacks includes "[[ | + | |description=Preparation for Cyber attacks includes "[[simulation]]s" to recognize "central points of vulnerability" |
}} | }} | ||
Preparation for '''Cyber attacks''' includes "[[simulation]]s" and [[planning exercises]] of "central points of vulnerability".<ref> | Preparation for '''Cyber attacks''' includes "[[simulation]]s" and [[planning exercises]] of "central points of vulnerability".<ref> |
Revision as of 19:45, 26 December 2021
Cyberattack/Preparation (Disaster/Preparation, Supply chain/Control) | |
---|---|
Preparation for Cyber attacks includes "simulations" to recognize "central points of vulnerability" |
Preparation for Cyber attacks includes "simulations" and planning exercises of "central points of vulnerability".[1]
An example
Page name | Description |
---|---|
Cyber Polygon 2020 | tabletop exercise on cyber security of the financial system |
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.