Physical controls

Physical controls: Security measures implemented in the physical environment to protect sensitive information from unauthorized access. These measures include locks, barriers, alarms, and surveillance cameras, aimed at deterring and detecting security threats. For example, locked doors and security cameras can prevent unauthorized entry to a building, while a password-protected login screen can secure information on […]

Piggyback attack

Piggyback attack: A type of cyber-attack where an unauthorized person gains access to a secure system by exploiting the credentials of an authorized user. This can bypass security measures and lead to unauthorized access to sensitive data or resources. Examples include using another user’s login credentials to access a network or following someone through a […]

Piggybacking

Piggybacking: The practice of gaining unauthorized access to a restricted area by following someone who has legitimate access. It is often used by individuals who do not have the proper credentials to enter a building or facility but can gain access by following someone who does. It is used in the field of information security […]

Ping Flood

Ping Flood: A type of cyber-attack that involves overwhelming a server or network with numerous ping requests, leading to a denial of service. It is used to exploit vulnerabilities and test the resilience of systems by potentially crashing a server or disrupting network communication.

Ping Of Death

Ping Of Death: The Ping of Death (PoD) attack is an older network attack method that involves sending malformed or oversized ping packets that exceed the maximum packet size allowed by the IP protocol. By exploiting this vulnerability, an attacker could potentially cause the target system to freeze, crash, or reboot. However, modern systems and […]

People safety in BC/DR (Business Continuity/Disaster Recovery)

People safety in BC/DR (Business Continuity/Disaster Recovery): The measures and strategies put in place to ensure the safety and well-being of individuals during and after a disaster or disruption. This concept is used in various industries, including healthcare, government, and critical infrastructure, to prevent loss of life and minimize damage to property and the environment. […]