Glossar

A B C D E F G H I K M P R S T V Z

Bad bots

Bad bots (also known as malware bots or script bots) are automated programs used by cybercriminals to carry out malicious activities on the Internet. These bots can perform a variety of tasks, including data theft, identity theft, network overload, spamming, … Read More

Brute force attack

With a brute force attack, a hacker aims to crack passwords. With the help of an algorithm, various character combinations are tried out in a very short time. For example, a 7-character password – consisting of one capital letter and … Read More

BSI IT baseline protection

BSI IT-Grundschutz (Federal Office for Information Security IT-Grundschutz) is a framework for IT security in Germany. It defines the necessary steps for securing IT systems and processes and supports companies and organizations in bringing their information security to an appropriate … Read More

Business Intelligence

Business Intelligence (BI) refers to the technologies, applications and practices for collecting, integrating, analyzing and presenting company data. The aim of BI is to support the decision-making process in companies by transforming data into meaningful insights and information. BI systems … Read More