back door - allows remote access to a computer system, DDoS attack - an attack that overwhelmes a web server by targeting requests, exploit - take advantage of a vulnerability, hacking - unauthorised access to a computer or network or the modification of programs, systems or security for unapproved purposes, honeypot - a decoy server that imitates the 'real' website to lure attackers away from production systems to waste time and dissapate their energies harmlessly, hot site - prepared external recovery IT infrastructure; where the duplicate is ready immediately to replace operations by restoring backups and resuming normal operations with little or no downtime , cold site - prepared external recovery IT infrastructure; when the duplicate is not immediately ready to replace operations, and may take a few weeks to resume normal operations, malware - 'malicious software' designed to infiltrate and damage computer systems without authorisation, man-in-the-middle (MITM) attack - a type of eavesdropping attack where communications and data are exposed to an unauthorised third party , phishing - pretending to be a reputable person or entity in order to induce the disclosure of sensitive information, ransomware - malicious software that will lock or encrypt a user's computer until a ransom fee is paid, risk tolerance - the quantity and nature of risk that is acceptable, social engineering attack - tricking the victim into clicking 'accept' with admin permissions or into giving the attacker physical access to a device, spyware - a program that collects information without the user's knowledge; it arrives as a free download and is automatically installed, threat modelling principles - a set of principals that outline how to prepare for dealing with cyber security threats, version control - records each stage of the development so that it is possible to 'roll back' to any previous point in the development, warm site - a recovery plan that is in between hot and cold, and limited in scope and scale compared with normal operations; it relies on restored backups beings brought online before systems and services can be make operational,

Ranking

Estilo visual

Opções

Alterar modelo

Restaurar arquivo salvo automaticamente: ?