Skip to main content
If you continue browsing this website, you agree to our policies:
  • cookie_policy
Continue
x
EIPA
  • Calendar
  • More
Crnogorski ‎(mis)‎
Crnogorski ‎(mis)‎ Deutsch ‎(de_wp)‎ Deutsch (du) ‎(de_du)‎ English ‎(en_wp)‎ Español ‎(es_wp)‎ Français ‎(fr_wp)‎ Italiano ‎(it_wp)‎ Nederlands ‎(nl_wp)‎ Polski ‎(pl)‎ Română ‎(ro_wp)‎
You are currently using guest access
Log in
EIPA
Calendar
Expand all Collapse all

Blocks

Course information

Table of contents

  • Introduction & Information

    • Course Module Information
  • SECTION 1 - THE THREAT LANDSCAPE

    • 1.1 Introducation & Threat Landscape
    • Reviewquestion 1
    • 1.2 Common types of Cyberattacks 1/2
    • Reviewquestion 2
    • 1.3 Common Types of Cyberattacks 2/2
    • Review Question 3
    • 1.4 - Impact on Data Protection & Threat Prevention
    • Review Question 4
  • Section 2 - Human Error/Weakest Link

  • Section 3 - Awareness trainings & IT/Cybersecurity Policy

  • Section 4 - How to draft an IT/Cybersecurity policy for your organisation

  • Section 5 - Cybersecurity Incident Management

    • End card
  1. Home
  2. Cybersecurity Policy Toolkit
  3. SECTION 1 - THE THREAT LANDSCAPE
  4. Review Question 3

Review Question 3

Completion requirements

Drag&Drop the field with the definition towards the zone below the name of the attack type

You are currently using guest access (Log in)
Policies
Get the mobile app
Powered by Moodle Workplace