Cyberattack/Preparation

From Wikispooks
< Cyberattack
Revision as of 13:47, 1 November 2022 by Jun (talk | contribs) (Jun moved page Cyber attack/Preparation to Cyberattack/Preparation: Spell)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Concept.png Cyberattack/Preparation
(Disaster/Preparation,  Supply chain/Control)Rdf-entity.pngRdf-icon.png
Preparation for Cyber attacks includes "simulations" to recognize "central points of vulnerability"

Preparation for Cyber attacks includes "simulations" and planning exercises of "central points of vulnerability".[1]

IT infrastructure

The worldwide IT infrastructure is supplied with rather uniform hardware and software.

Windows

Full article: Windows

Most of the IT infrastructure in big companies runs the Microsoft Windows operating system. Windows and software that runs on it needs constantly fixing for security flaws.

Hardware backdoor

Full article: backdoor

Processors and UEFI have undocumented security flaws which may be intentional backdoors.[2]


 

An example

Page nameDescription
Cyber Polygon 2020tabletop exercise on cyber security of the financial system
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References


57px-Notepad icon.png This is a page stub. Please add to it.