Risk Mitigation

The process of prioritising, assessing and executing appropriate risk controls to avoid cyber security breaches.

February 14, 2023
Risk Assessment

The process identifying, analysing and evaluating cyber security risks to ensure that time, efforts and resources are being allocated correctly.

February 14, 2023
Resilience

Focuses upon an organisations ability to prevent, survive and recuperate from cyber security incidences.

February 14, 2023
Removable Media

Refers to portable data such as optical disks, external hard drives and flesh memory cards that can be added or removed from...

February 14, 2023
Remote Access

The capability of users to access a device or network from any site.

February 14, 2023
Recovery Procedures

A type of data protection solution, recovery procedures are designed to address modern threats to enhance the security of systems and software.

February 14, 2023
Real-Life/ Real-World

Awareness training over time can become outdated. Therefore, training courses must adapt their training to real world experiences and knowledge to ensure...

February 14, 2023
Rootkit

A collection of exploit tools maliciously installed onto a system to aid an attacker implement an attack.

January 19, 2023
Replay Attacks

These type of attacks monitor traffic and then send back into the system some very similar traffic. The intention is to upset...

January 19, 2023