Cybersecurity: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson m (Categorise.) |
imported>Doug Williamson (Update links.) |
||
(3 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
==See also== | ==See also== | ||
* [[Advanced Persistent Threat]] | |||
*[[BCM]] | *[[BCM]] | ||
*[[Business continuity plan]] | *[[Business continuity plan]] | ||
Line 10: | Line 11: | ||
*[[Cyber attack]] | *[[Cyber attack]] | ||
*[[Cyber risk]] | *[[Cyber risk]] | ||
*[[Cyber security: protecting your business and your clients]] | |||
*[[Cybercrime – A Threat And An Opportunity]] | |||
*[[Cyberspace]] | *[[Cyberspace]] | ||
*[[ | *[[Cyberthreat]] | ||
*[[ | *[[Digital footprint]] | ||
*[[IAM]] | |||
[[Category:Financial_risk_management]] | [[Category:Financial_risk_management]] | ||
[[Category:Technology]] | [[Category:Technology]] |
Latest revision as of 06:20, 24 January 2022
Cybersecurity is the ability to protect or defend the use of cyberspace from cyber attacks.
Sometimes written as 'cyber security'.