Skip to main content
There is a temporary issue on this page. Please, try later. We apologise for this inconvenience.

Show filters

Hide filters

Filters

cyber attack counter-measures

Description

Description

The strategies, techniques and tools that can be used to detect and avert malicious attacks against organisations' information systems, infrastructures or networks.
Examples are secure hash algorithm (SHA) and message digest algorithm (MD5) for securing network communications, intrusion prevention systems (IPS), public-key infrastructure (PKI) for encryption and digital signatures in applications.

Alternative Labels

cyber attack counter-measures

network communications security measures