Bad bots (also known as malware bots or script bots) are automated programs used by cybercriminals to carry out malicious activities on the Internet. These bots can perform a variety of tasks, including data theft, identity theft, network overload, spamming, … Read More
Glossar
Brute force attack
With a brute force attack, a hacker aims to crack passwords. With the help of an algorithm, various character combinations are tried out in a very short time. For example, a 7-character password – consisting of one capital letter and … Read More
BSI IT baseline protection
BSI IT-Grundschutz (Federal Office for Information Security IT-Grundschutz) is a framework for IT security in Germany. It defines the necessary steps for securing IT systems and processes and supports companies and organizations in bringing their information security to an appropriate … Read More
Business Intelligence
Business Intelligence (BI) refers to the technologies, applications and practices for collecting, integrating, analyzing and presenting company data. The aim of BI is to support the decision-making process in companies by transforming data into meaningful insights and information. BI systems … Read More