Myra
Knowledge Hub
Cloud, Big Data, AI, Cyber Security and more: In the Knowledge Hub of Myra Security you will find interesting facts about the most exciting topics of our digitalized society – presented in an understandable and informative way.


DDoS attacks

Web-Tech
- What is DNS? ➔
- What is HTTP/2? ➔
- What is Anycast? ➔
- What is SSL/TLS? ➔
- What is the cloud (cloud computing)? ➔
- What is the OSI model? ➔
- What is the Tor network? ➔
- What is the darknet? ➔
- What Is the Internet of Things (IoT)? ➔
- What is a blockchain? ➔
- What is edge computing? ➔
- What is an e-prescription? ➔
- What is DNSSEC? ➔
- What is an autonomous system and what are AS Numbers (ASN)? ➔
- What is DNS over TLS? ➔

Cybersecurity

Data protection & Compliance
- IT security & outsourced activities and processes according to MaRisk AT 9 ➔
- IT security as outsourcing according to MaGo and section 32 VAG ➔
- What is Business Continuity Management (BCM)? ➔
- What is encryption? ➔
- ISO 27001 vs. ISO 27001 based on IT-Grundschutz ➔
- What is DORA (Digital Operational Resilience Act)? ➔
- What Is an Information Security Management System (ISMS)? ➔
- What is Privacy Shield? ➔
- What is IT compliance? ➔
- What are DiGA? ➔
- What are the BAIT? ➔

Threats
- What are hype sales bots? ➔
- What is cart abandonment? ➔
- What is Skewing ➔
- What is Web Scraping? ➔
- What is SQL-Injection? ➔
- What is cross-site scripting? ➔
- What is credential stuffing? ➔
- What is credential cracking? ➔
- What is a brute-force attack? ➔
- What is Form Spam ➔
- What is malware? ➔
- What is DNS cache poisoning? ➔
- What is DNS Spoofing? ➔
- What is a cyber attack? ➔
- What is behind Social Engineering? ➔
- What is whaling? ➔
- What is doxing? ➔