From Wikispooks
Jump to navigation Jump to search

Concept.png Cyberattack/Preparation
(Disaster/Preparation,  Supply chain/Control)Rdf-entity.pngRdf-icon.png
Preparation for Cyber attacks includes "simulations" to recognize "central points of vulnerability"

Preparation for Cyber attacks includes "simulations" and planning exercises of "central points of vulnerability".[1]

IT infrastructure

The worldwide IT infrastructure is supplied with rather uniform hardware and software.


Full article: Windows

Most of the IT infrastructure in big companies runs the Microsoft Windows operating system. Windows and software that runs on it needs constantly fixing for security flaws.

Hardware backdoor

Full article: backdoor

Processors and UEFI have undocumented security flaws which may be intentional backdoors.[2]


An example

Page nameDescription
Cyber Polygon 2020tabletop exercise on cyber security of the financial system
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


57px-Notepad icon.png This is a page stub. Please add to it.