Network Access

Network Access Network access refers to the ability to access a company network – usually governed by user rights and security measures. What exactly does network access mean? Not everyone is permitted to access all systems. Access is strictly controlled, for example through user accounts, passwords or additional security measures such as MFA. Where do […]

Incident Response Plan

Incident Response Plan A contingency plan sets out what to do in the event of a cyberattack or IT failure. What does a contingency plan entail in detail? The plan outlines clear procedures, responsibilities and measures to enable a rapid and structured response to security incidents. The aim is to minimise damage and restore operations […]

User data

User data User data is all data that relates to a person, e.g. name, e-mail address or login information. What does user data mean in detail? This includes both obvious data such as contact details and sensitive information such as passwords or user behavior. This data is particularly worth protecting as it can be misused. […]

Network Security

Network Security Network security describes the protection of IT networks against unauthorized access, attacks or data loss. What does network security mean in detail? Technical and organizational measures ensure that only authorized persons and systems can access a network. At the same time, data is protected and attacks are detected or averted at an early […]

Yubikey

Yubikey A YubiKey is a physical security key that is used to log in and additionally secure accounts. What does YubiKey mean in detail? The YubiKey is a small device that is connected to a computer or smartphone via USB or NFC, for example. It serves as an additional factor when logging in (multi-factor authentication). […]

Least privilege

Least privilege The principle of least privilege means that users only receive the access rights they absolutely need for their work. What does Least Privilege mean in detail? Instead of assigning comprehensive rights, access is deliberately restricted. This prevents systems or data from being unnecessarily compromised. The principle is often used for user accounts and […]

Gateway

Gateway A gateway is a transition point between two networks via which data is forwarded from one network to another. What does gateway mean in detail? A gateway connects different networks with each other, for example the internal company network with the Internet. It ensures that data reaches the right destination and can be exchanged […]

JSON (JavaScript Object Notation)

JSON (JavaScript Object Notation) JSON is a simple data format that is used to exchange information between systems. What does JSON mean in detail? JSON is an easy-to-understand format in which data is represented in a structured way. It is often used so that programs can exchange information. The data is stored in the form […]

XXS (Cross-Site Scripting)

XSS (Cross-Site Scripting) Cross-site scripting (XSS) is an attack technique in which malicious code is injected into websites. What does XSS mean in detail? In an XSS attack, attackers exploit security vulnerabilities in websites to inject their own code. This code is then executed in the browser of other users. This allows e.g: Data can […]

HTTPS

HTTPS HTTPS stands for “Hypertext Transfer Protocol Secure” and refers to a secure connection between your browser and a website. What does HTTPS mean in detail? With HTTPS, the data between your device and the website is transmitted in encrypted form. This means that third parties cannot simply read or manipulate the information. You recognize […]