Business

What is Meltdown?

What is Meltdown

Meltdown is a security vulnerability published in 2018 together with Spectre. It is due to a vulnerability in the hardware architecture of processors and allows unauthorized reading of the memory contents of third-party processes. Processors from various manufacturers such as x86 processors from Intel are affected. Software patches to fix the problem cause performance degradation. …

What is Meltdown? Read More »

What is a DDoS attack?

What is a DDoS attack

A DDoS attack attempts to cause the unavailability of Internet service through a deliberately induced overload. Usually, botnets consisting of a multitude of individual systems are used for the attack. The target of the attack can be servers or other network components. What is a DDoS attack (Distributed Denial of Service (DDoS)? The acronym DDoS …

What is a DDoS attack? Read More »

What is Air Gap?

What is Air Gap security

Air Gap is a security concept that meets the highest security requirements. It describes the complete physical and logical isolation of computers from each other and from networks. Information exchange between systems is possible, for example, via transportable storage media. Methods such as side-channel attacks exist to overcome an air gap. What is Air Gap? …

What is Air Gap? Read More »

What is Patch Management?

What is Patch Management

Patch management is nowadays an integral part of system management. It deals with the procurement, testing, and installation of required updates for applications, drivers, and operating systems of computers. What is Patch Management? The literal translation of the English term “to patch” is “to mend”. Transferred to the world of programming, patch refers to software …

What is Patch Management? Read More »

What is Phishing?

What is phishing

Phishing describes the attempt to steal identities and passwords via the Internet by sending fake e-mails or text messages. Internet users are lured by cybercriminals to fake websites of banks, online stores, or other online services by means of deceptively real fake e-mails in order to get hold of their user IDs and passwords. The …

What is Phishing? Read More »

What is Cyber Resilience?

What is Cyber Resilience?

Cyber Resilience is a holistic strategy to strengthen the resilience of an organization’s IT against cyber attacks. Among other things, cyber resilience includes the concepts of cyber security and business continuity management. It is designed to prevent attacks on IT and ensure secure continued operations and rapid resumption of operations. What is Cyber Resilience? Cyber …

What is Cyber Resilience? Read More »

What is Data Protection?

What is data protection

Data protection, i.e. the protection of personal data, secures the fundamental right of individuals to informational self-determination. This gives people the freedom to determine how their data is handled. Personal rights and privacy are to be preserved. What is data protection? Data protection does not protect the data itself, but rather the freedom of people …

What is Data Protection? Read More »

What is a Network Domain?

What is a Network Domain

A network domain is an administratively delimited network area that can be used to logically map the organizational structures of a company. Security policies, user rights, and user roles are managed centrally via a domain controller. A user logs on to a domain via the domain controller. Domains have unique names and are structured hierarchically. …

What is a Network Domain? Read More »

What is DevSecOps?

What is DevSecOps?

DevSecOps extends the DevOps concept to include aspects of software security. The artificial word is made up of the individual terms development, security, and operations. It is a holistic approach that takes security into account in all phases of the software lifecycle and integrates it into the processes. What is DevSecOps? DevSecOps is a made-up …

What is DevSecOps? Read More »

What is Business Continuity?

what is business continuity

Business continuity describes measures and processes that are intended to maintain IT operations under crisis situations or ensure trouble-free start-up after a failure. Business continuity is intended to minimize risks and damages for companies and organizations. What is Business Continuity? Business continuity includes strategies, plans, measures, and processes to minimize damage caused by the interruption …

What is Business Continuity? Read More »