Difference between revisions of "Cyberattack/Preparation"

From Wikispooks
Jump to navigation Jump to search
(windows)
Line 8: Line 8:
 
       https://www.thelastamericanvagabond.com/another-mega-group-spy-scandal-samanage-sabotage-and-the-solarwinds-hack/
 
       https://www.thelastamericanvagabond.com/another-mega-group-spy-scandal-samanage-sabotage-and-the-solarwinds-hack/
 
     </ref>
 
     </ref>
 +
 +
==Windows==
 +
{{FA|Windows}}
 +
Most of the IT infrastructure in big companies runs the [[Microsoft]] Windows [[operating system]]. Windows and software that runs on it needs constantly fixing for security flaws.
  
 
{{SMWDocs}}
 
{{SMWDocs}}

Revision as of 22:22, 11 January 2022

Concept.png Cyberattack/Preparation
(Disaster/Preparation,  Supply chain/Control)Rdf-entity.pngRdf-icon.png
Preparation for Cyber attacks includes "simulations" to recognize "central points of vulnerability"

Preparation for Cyber attacks includes "simulations" and planning exercises of "central points of vulnerability".[1]

Windows

Full article: Windows

Most of the IT infrastructure in big companies runs the Microsoft Windows operating system. Windows and software that runs on it needs constantly fixing for security flaws.


 

An example

Page nameDescription
Cyber Polygon 2020tabletop exercise on cyber security of the financial system
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References


57px-Notepad icon.png This is a page stub. Please add to it.