ISO 31000 🟦 Standard

ISO 31000 provides principles and guidelines for risk management in organisations. It proposes a structured approach for identifying, analysing, treating and monitoring risks.

Evil twin 🔴 Attack

An evil twin is a fake Wi-Fi access point that imitates a legitimate network in order to intercept user data. It impersonates a genuine Wi-Fi network by copying its name (SSID) and characteristics.

JWT (JSON Web Token) 🟢 Protection

A JWT (JSON Web Token) is an open standard defined by RFC 7519 used in cybersecurity to authenticate and secure information exchanges between parties.

It enables data to be transmitted in a compact, secure and verifiable way, using digital signatures or encryption to guarantee the integrity and, where necessary, the confidentiality of the information.

Keylogger (keylogger) 🔴 Attack

A keylogger is a software or hardware device used by cybercriminals to record keystrokes made on a keyboard (computer, telephone, etc.). It is often used to steal passwords, credit card numbers, bank details and other sensitive data.

Kill chain

A kill chain is a conceptual model describing the successive stages of a cyber attack, from planning to achieving the malicious objectives.

This concept, borrowed from the military, was adapted to cybersecurity by Lockheed Martin in 2011. This approach enables defenders to understand, anticipate and disrupt attacks by identifying possible breaking points at each phase.