An Advanced Persistent Threat (APT) is an advanced and persistent threat that usually targets companies, organizations or government institutions. An APT attack is usually carried out by highly skilled cybercriminals or state actors who deliberately and continuously attempt to penetrate … Read More
Glossar
Brute force attack
With a brute force attack, a hacker aims to crack passwords. With the help of an algorithm, various character combinations are tried out in a very short time. For example, a 7-character password – consisting of one capital letter and … Read More
BSI IT baseline protection
BSI IT-Grundschutz (Federal Office for Information Security IT-Grundschutz) is a framework for IT security in Germany. It defines the necessary steps for securing IT systems and processes and supports companies and organizations in bringing their information security to an appropriate … Read More
Business Intelligence
Business Intelligence (BI) refers to the technologies, applications and practices for collecting, integrating, analyzing and presenting company data. The aim of BI is to support the decision-making process in companies by transforming data into meaningful insights and information. BI systems … Read More
Computer virus
A computer virus is a type of malware that is capable of spreading itself and inserting itself into other computer programs or files. In general, a virus only becomes active when the infected code is executed. Once this happens, the … Read More
Cross-site scripting
Cross-site scripting (XSS) is an attack method that specifically targets web applications in order to inject malicious code (usually JavaScript) into a website. This code is then executed unnoticed in the user’s browser when the infected page is accessed. This … Read More
Cybercrime
Cybercrime refers to criminal offenses that are committed using computer systems, the internet or other digital technologies. These crimes can be committed by individuals, groups or organizations and can take a variety of forms, including: Phishing: The attempt to steal … Read More
Cybercrime insurance
Cybercrime insurance is a special insurance policy that protects companies against financial losses in connection with cybercrime. This type of insurance usually provides protection against losses that can be caused by data theft, hacker attacks, malware infections, ransomware, phishing attacks … Read More
Cyberheist
Cyberheist is a term made up of the words “cyber” and “heist” and describes a type of criminal activity in which a thief or group of thieves hacks into a digital facility, such as a bank or financial institution, to … Read More
Data breach
A data breach is the unauthorized access, loss or theft of sensitive data by a person or group who is not authorized to do so. Such a breakdown can be caused by human error, inadequate safety measures or technical faults. … Read More
Data governance
Data governance is a term from information management practice that refers to the management and control of data within an organization. Data governance aims to ensure that data is properly recorded, stored, managed and used within the company. Effective data … Read More
Data Literacy
Data literacy is the ability to understand, interpret, analyze and communicate data. It is an important part of digital literacy and the ability to navigate in today’s data-driven world. Data literacy encompasses the ability to identify, collect, store and organize … Read More
Data management
Data management is a computer science term that deals with the management of data in a company, an organization or an individual context. It covers the entire life cycle of data, from its creation and collection through to storage, processing, … Read More
Data Mining
Data mining is a process of discovering useful information from large amounts of data by identifying patterns and relationships that might not otherwise be obvious. It is a machine learning method that is frequently used in science, business and other … Read More
Data protection impact assessment
Data protection impact assessment (DPIA) is a procedure used in the field of data protection to assess and minimize the impact of data processing on the privacy of data subjects. The purpose of a DPIA is to identify potential risks … Read More
DDoS attack
A DDoS attack (Distributed Denial of Service) is a cyber attack that aims to make a system – usually a web server or online service – inaccessible by overloading its resources. To do this, the server or network is flooded … Read More
Defense Cyber Security
Defense Cyber Security refers to the protective measures taken to protect government and military networks, systems and data from cyber attacks and threats. There are several options for Defence Cyber Security, including: Network monitoring and analysis to detect and prevent … Read More
DNS spoofing
DNS spoofing (also known as DNS spoofing or DNS hijacking ) is an attack technique in which attackers manipulate the Domain Name System (DNS) to direct users to fake websites. The DNS is responsible for converting web addresses such as“www.example.com” … Read More
E-mail spoofing
Email spoofing refers to a practice in which an attacker inserts false information into the sender of an email to trick the recipient into believing the email is legitimate. This is often used by cybercriminals to carry out phishing attacks … Read More
Go Digital
Go Digital is a funding initiative of the Federal Ministry for Economic Affairs and Energy (BMWi) that supports small and medium-sized enterprises (SMEs) with digitalization. The initiative was launched in 2017 and aims to support SMEs in their transition to … Read More
IDS/IPS and firewall solutions
IDS/IPS and firewall solutions are preventive measures for securing a network or an application. A firewall can block unwanted traffic or control access authorizations. IDS/IPS systems can recognize unusual activities and react to them by blocking the data traffic or … Read More
IP address
An IP address (Internet Protocol address) is a numerical identifier that is assigned to computers and other network devices to identify them on the Internet and in other networks. An IP address consists of a series of four numbers separated … Read More
IT compliance
IT compliance is a term from the field of information technology and refers to compliance with legal, regulatory and operational requirements in connection with IT systems and processes. In today’s business world, IT compliance is of great importance as companies … Read More
IT security
IT security is a broad topic that encompasses many different aspects. One important area is the protection of computer networks and infrastructures. To ensure this, there are various technologies that can be used. A firewall, for example, is an important … Read More
Malvertising
Malvertising is a term made up of the words “malware” and “advertising”. It refers to the use of online ads to download and execute malicious software (malware) on the user’s computer. Malvertising attacks can be carried out in various ways. … Read More
Man-in-the-middle
A man-in-the-middle attack (MITM) is a cyberattack method in which an attacker secretly penetrates the communication between two parties in order to intercept, manipulate or forward information. The attack usually goes unnoticed by the person affected, as the communication appears … Read More
Penetration testing
Penetration testing simulates an attack on the system or application to see how well it is protected against real threats. Penetration Testing is often carried out by external experts and can help to assess the actual security of the system.
Ransomware
Ransomware is a form of malware that aims to make a computer system or certain data inaccessible by encrypting it. The name is derived from the word “ransom”, as attackers usually demand a large sum of money after a successful … Read More
Resilience
Resilience is a term used in psychology to describe a person’s ability to cope with difficult life situations and emerge stronger from them. A person with a high level of resilience is able to overcome crises, challenges or changes in … Read More
Social engineering
Social engineering is a method of fraud or manipulation that aims to exploit human weaknesses and behaviors to gain access to information or resources that are not normally accessible. The term refers to the use of social interactions and relationships … Read More
Spear phishing
Spear Phishing ist eine Form des Phishings, bei der Angreifer gezielte E-Mails an Einzelpersonen oder Unternehmen senden, um vertrauliche Informationen zu sammeln oder Schadsoftware zu verbreiten. Im Gegensatz zu herkömmlichem Phishing, das breit gestreut und zufällig ist, zielt Spear … Read More
SQL injection
SQL injection (SQLi) is an attack technique in which attackers exploit a vulnerability in the database query of a web application to inject malicious SQL commands. These commands allow the attacker to gain access to confidential data, manipulate or delete … Read More
Trojan horse
A Trojan is a type of malware that disguises itself as a useful application in order to gain access to a computer system or carry out harmful actions. The name Trojan goes back to Greek mythology, in which the Greeks … Read More
Vulnerability assessment
Vulnerability-Assessment refers to the process of identifying and evaluating security vulnerabilities in a system or application. This can be done using automated tools or manual checks. The aim is to identify potential vulnerabilities before they can be exploited by attackers.
Vulnerability management
Vulnerability management refers to the process of identifying, assessing and eliminating security gaps in an IT infrastructure or software. The aim of vulnerability management is to minimize the risk of attacks on a system by identifying and eliminating security gaps … Read More
Vulnerability management
Vulnerability management is a broader approach that includes identifying vulnerabilities, but also assessing risks, prioritizing actions and monitoring changes over time. It is therefore not only about identifying weaknesses, but also about implementing measures to eliminate risks.
Zero-day exploit
A zero-day exploit is an attack that takes advantage of a previously unknown vulnerability in a software or system. The term “zero-day” indicates that the developers or the responsible organization had no warning – in other words, there were “zero … Read More