The process of prioritising, assessing and executing appropriate risk controls to avoid cyber security breaches.
The process identifying, analysing and evaluating cyber security risks to ensure that time, efforts and resources are being allocated correctly.
Focuses upon an organisations ability to prevent, survive and recuperate from cyber security incidences.
Refers to portable data such as optical disks, external hard drives and flesh memory cards that can be added or removed from...
The capability of users to access a device or network from any site.
A type of data protection solution, recovery procedures are designed to address modern threats to enhance the security of systems and software.
Awareness training over time can become outdated. Therefore, training courses must adapt their training to real world experiences and knowledge to ensure...
These type of attacks monitor traffic and then send back into the system some very similar traffic. The intention is to upset...