mastodon.bida.im is part of the decentralized social network powered by Mastodon.
Un'istanza mastodon antifascista. autogestita, italofona con base a Bologna. Rispettosa di privacy e anonimato.

Server stats:

863
active users

Learn more

#Identificare

0 posts0 participants0 posts today
Redhotcyber<p>RHC CyberPills: oggi scopriamo cos&#39;è il port-scanning.</p><p>Il port scanning è una tecnica utilizzata dagli <a href="https://mastodon.bida.im/tags/amministratori" class="mention hashtag" rel="tag">#<span>amministratori</span></a> di <a href="https://mastodon.bida.im/tags/rete" class="mention hashtag" rel="tag">#<span>rete</span></a> e dagli <a href="https://mastodon.bida.im/tags/hacker" class="mention hashtag" rel="tag">#<span>hacker</span></a> (sia etici che criminali) per scoprire quali porte di un <a href="https://mastodon.bida.im/tags/sistema" class="mention hashtag" rel="tag">#<span>sistema</span></a> <a href="https://mastodon.bida.im/tags/informatico" class="mention hashtag" rel="tag">#<span>informatico</span></a> sono aperte e quali <a href="https://mastodon.bida.im/tags/servizi" class="mention hashtag" rel="tag">#<span>servizi</span></a> o <a href="https://mastodon.bida.im/tags/applicazioni" class="mention hashtag" rel="tag">#<span>applicazioni</span></a> si stanno utilizzando. </p><p>In pratica, il <a href="https://mastodon.bida.im/tags/portscanning" class="mention hashtag" rel="tag">#<span>portscanning</span></a> consiste nell&#39;invio di <a href="https://mastodon.bida.im/tags/pacchetti" class="mention hashtag" rel="tag">#<span>pacchetti</span></a> di dati verso le porte del <a href="https://mastodon.bida.im/tags/sistema" class="mention hashtag" rel="tag">#<span>sistema</span></a>, al fine di verificare se esse sono aperte o chiuse. </p><p>Questa tecnica può essere utilizzata per <a href="https://mastodon.bida.im/tags/identificare" class="mention hashtag" rel="tag">#<span>identificare</span></a> potenziali punti deboli della <a href="https://mastodon.bida.im/tags/sicurezza" class="mention hashtag" rel="tag">#<span>sicurezza</span></a> della rete, ma anche per scopi <a href="https://mastodon.bida.im/tags/malevoli" class="mention hashtag" rel="tag">#<span>malevoli</span></a>, come individuare porte aperte su un sistema per sfruttarle e infiltrarsi nel sistema stesso. </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cyberskill" class="mention hashtag" rel="tag">#<span>cyberskill</span></a> <a href="https://mastodon.bida.im/tags/cyberpills" class="mention hashtag" rel="tag">#<span>cyberpills</span></a> <a href="https://mastodon.bida.im/tags/technology" class="mention hashtag" rel="tag">#<span>technology</span></a> <a href="https://mastodon.bida.im/tags/pentest" class="mention hashtag" rel="tag">#<span>pentest</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/hacker" class="mention hashtag" rel="tag">#<span>hacker</span></a> <a href="https://mastodon.bida.im/tags/tecnologiainformatica" class="mention hashtag" rel="tag">#<span>tecnologiainformatica</span></a> <a href="https://mastodon.bida.im/tags/infosec" class="mention hashtag" rel="tag">#<span>infosec</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a> <a href="https://mastodon.bida.im/tags/cybersec" class="mention hashtag" rel="tag">#<span>cybersec</span></a> <a href="https://mastodon.bida.im/tags/RHCskill" class="mention hashtag" rel="tag">#<span>RHCskill</span></a></p>
Redhotcyber<p>Scopriamo cos’è la Business Impact Analysis (BIA)</p><p>La Business Impact Analysis (<a href="https://mastodon.bida.im/tags/BIA" class="mention hashtag" rel="tag">#<span>BIA</span></a>) è uno <a href="https://mastodon.bida.im/tags/strumento" class="mention hashtag" rel="tag">#<span>strumento</span></a> fondamentale per garantire la <a href="https://mastodon.bida.im/tags/continuit%C3%A0" class="mention hashtag" rel="tag">#<span>continuità</span></a> del <a href="https://mastodon.bida.im/tags/business" class="mention hashtag" rel="tag">#<span>business</span></a>.</p><p>La BIA aiuta le <a href="https://mastodon.bida.im/tags/organizzazioni" class="mention hashtag" rel="tag">#<span>organizzazioni</span></a> a <a href="https://mastodon.bida.im/tags/identificare" class="mention hashtag" rel="tag">#<span>identificare</span></a> le attività critiche per la loro <a href="https://mastodon.bida.im/tags/operativit%C3%A0" class="mention hashtag" rel="tag">#<span>operatività</span></a>, i <a href="https://mastodon.bida.im/tags/rischi" class="mention hashtag" rel="tag">#<span>rischi</span></a> associati a tali attività e gli impatti derivanti dalla <a href="https://mastodon.bida.im/tags/mancata" class="mention hashtag" rel="tag">#<span>mancata</span></a> <a href="https://mastodon.bida.im/tags/disponibilit%C3%A0" class="mention hashtag" rel="tag">#<span>disponibilità</span></a> delle stesse.</p><p>L’obiettivo finale della BIA è quello di <a href="https://mastodon.bida.im/tags/sviluppare" class="mention hashtag" rel="tag">#<span>sviluppare</span></a> <a href="https://mastodon.bida.im/tags/strategie" class="mention hashtag" rel="tag">#<span>strategie</span></a> e misure di continuità del <a href="https://mastodon.bida.im/tags/business" class="mention hashtag" rel="tag">#<span>business</span></a> per minimizzare gli impatti negativi derivanti da eventuali interruzioni delle attività.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/scopriamo-cose-la-business-impact-analysis-nel-mondo-it/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/scopriamo</span><span class="invisible">-cose-la-business-impact-analysis-nel-mondo-it/</span></a></p>
Redhotcyber<p>Cosa si intende per ICT Risk Management. Un processo a supporto della sicurezza informatica</p><p>L’ICT Risk Management è un <a href="https://mastodon.bida.im/tags/processo" class="mention hashtag" rel="tag">#<span>processo</span></a> che si occupa di <a href="https://mastodon.bida.im/tags/identificare" class="mention hashtag" rel="tag">#<span>identificare</span></a>, <a href="https://mastodon.bida.im/tags/valutare" class="mention hashtag" rel="tag">#<span>valutare</span></a> e <a href="https://mastodon.bida.im/tags/gestire" class="mention hashtag" rel="tag">#<span>gestire</span></a> i <a href="https://mastodon.bida.im/tags/rischi" class="mention hashtag" rel="tag">#<span>rischi</span></a> legati all’utilizzo delle tecnologie dell’informazione e della comunicazione (ICT).</p><p>In questo articolo, esploreremo l’ICT Risk Management, i suoi <a href="https://mastodon.bida.im/tags/obiettivi" class="mention hashtag" rel="tag">#<span>obiettivi</span></a>, i suoi principi e le sue <a href="https://mastodon.bida.im/tags/metodologie" class="mention hashtag" rel="tag">#<span>metodologie</span></a>. Inoltre, discuteremo l’importanza dell’ICT Risk Management e come questo processo sia essenziale per la sicurezza <a href="https://mastodon.bida.im/tags/informatica" class="mention hashtag" rel="tag">#<span>informatica</span></a> delle aziende oggi.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/cosa-si-intende-per-ict-risk-management-un-processo-a-supporto-della-sicurezza-informatica/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/cosa-si-i</span><span class="invisible">ntende-per-ict-risk-management-un-processo-a-supporto-della-sicurezza-informatica/</span></a></p>
tutorialseri<p>Come Identificare i Sintomi delle Arterie Ostruite <a href="https://mastodon.bida.im/tags/howto" class="mention hashtag" rel="tag">#<span>howto</span></a> <a href="https://mastodon.bida.im/tags/diy" class="mention hashtag" rel="tag">#<span>diy</span></a> <a href="https://mastodon.bida.im/tags/Identificare" class="mention hashtag" rel="tag">#<span>Identificare</span></a></p>