IT-Sicherheit
- 2-Faktor-Authentifizierung (2FA)
- Antivirus
- Backdoor
- Backup
- Blacklist
- Botnet
- Brute-Force-Attacke
- Captcha
- Cyberangriff
- Cyberkriminalität
- Cybersicherheit
- Datenverschlüsselung
- Disaster Recovery
- Endpoint Detection and Response (EDR)
- ePrivacy
- Extended Detection and Response (XDR)
- Hacker
- Hochverfügbarkeit
- Human Hacking
- Identitätsdiebstahl
- Incident Response
- Informationssicherheit
- IT-Analyse
- Keylogger
- Malware
- Mehr-Faktor-Authentifizierung (MFA)
- Patch
- Patch Management
- Penetrationstest
- Phishing
- Ransomware
- Rootkit
- Security Information and Event Management (SIEM)
- Security Operations Center (SOC)
- Security Orchestration, Automation, and Response (SOAR)
- Social Engineering
- Spam
- SSL Verschlüsselung
- Trojaner
- Virtual Private Network (VPN)
- Whitelist
- Zero Day Exploit