Phases of BCP (Business Continuity Planning)
Phases of BCP (Business Continuity Planning): Business Continuity Planning (BCP) involves several structured phases to ensure an organization can continue operations during and after a significant disruption. The key phases include Business Impact Analysis (BIA), which evaluates the potential effects of disruptions; Risk Assessment to identify threats and vulnerabilities; Strategy Development for maintaining critical functions; […]
Phishing
Phishing: A type of cyber-attack that involves tricking individuals into revealing sensitive information, such as passwords or financial data, through fraudulent emails or websites. It is often used by hackers to gain access to accounts or steal personal information. 3 examples of phishing attacks are fake emails from banks asking for account information, fake online […]
Phreakers
Phreakers: Individuals who engage in the unauthorized access of telecommunication systems, such as telephone networks or voicemail systems. They may use special equipment or software to bypass security measures and gain access to restricted information or services. It is used in the field of information security to identify and prevent potential security breaches in telecommunications […]
Physical controls
Physical controls: Security measures implemented in the physical environment to protect sensitive information from unauthorized access. These measures include locks, barriers, alarms, and surveillance cameras, aimed at deterring and detecting security threats. For example, locked doors and security cameras can prevent unauthorized entry to a building, while a password-protected login screen can secure information on […]
Piggyback attack
Piggyback attack: A type of cyber-attack where an unauthorized person gains access to a secure system by exploiting the credentials of an authorized user. This can bypass security measures and lead to unauthorized access to sensitive data or resources. Examples include using another user’s login credentials to access a network or following someone through a […]
Piggybacking
Piggybacking: The practice of gaining unauthorized access to a restricted area by following someone who has legitimate access. It is often used by individuals who do not have the proper credentials to enter a building or facility but can gain access by following someone who does. It is used in the field of information security […]