Penetration Testing, or Pen Testing for short, is the process of purposefully testing a system to see if it can be hacked. Pen testers are also often called ethical hackers.
Phishing
Phishing emails try to gather details from someone. They often try to fake real websites/businesses.
All users within an organisation should remain vigilant, as phishing opens up the possibilities for various different kinds of cyber attacks.
OT: Operational Technology
OT, or Operational Technology, is any technology which provides “on-the-floor” operations. These are typically automation technologies, and includes:
Robotics
Dot by Awen is an asset (aka device) and vulnerability discovery system for Operational Technologies, and works in all kinds of industries.
OES: Operators of Essential Services
An Operator of Essential Services (OES) is essentially an owner or administrator of a service or infrastructure to the smooth and efficient running of society. This typically includes Critical National Infrastructures.
NCSC: National Cyber Security Centre
There are a number of National Cyber Security Centres (or Centers) across the world.
The United Kingdom (UK) has a National Cyber Security Centre (NCSC) which is part of GCHQ.
Websites:
NOC: Network Operations Centre
A Network Operations Centre (NOC) is a location or team which is for the monitoring, control and general management of a network. They are typically established to ensure high reliability and high availability.
NIS Directive
The NIS Directive, or Network and Information Systems Directive on Security, is a European Union wide directive which specifies that Critical National Infrastructures (CNI) and Digital Marketplaces should be at a good level of cyber security in terms of policy and procedure. This is because the European Union recognises that the organisations which run these infrastructures are becoming increasingly more digital and increasingly more internet connected, which exposes more vulnerabilities than society has ever seen before.
Profile by Awen helps Critical National Infrastructures, and their suppliers, to reach the best level of cyber security policies & procedures possible.
Dot by Awen helps industrial organisations, including Critical National Infrastructures to understand their Operational Technologies to the highest level possible, and to make steps towards reducing cyber vulnerabilities of those systems.
MITM: Man-in-the-Middle
MITM is an acronym for Man-in-the-Middle, this is a type of cyber attack where an attacker intercepts or eavesdrops authentic communication. This particular attack is made simpler on unencrypted and poorly encrypted communications.