Key Visual IT Security Knowledge Hub

Myra Knowledge Hub

Cloud, Big Data, AI, Cyber Security and more: In the Knowledge Hub of Myra Security you will find interesting facts about the most exciting topics of our digitalized society – presented in an understandable and informative way.

DDoS Attacks

What is „DDoS“?

Learn more

What is “DDoS Mitigation”?

Learn more

What is a botnet?

Learn more

What is a Security Operations Center (SOC)?

Learn more

What is Mirai?

Learn more

What is a DRDoS & RDoS attack?

Learn more

What is an HTTP flood attack?

Learn more

What are IP stressers/booters?

Learn more

What is Slowloris?

Learn more

What is the Low Orbit Ion Cannon?

Learn more

Web-Tech

What is DNS?

Learn more

What is SSL/TLS?

Learn more

What is HTTP/2?

Learn more

What is Anycast?

Learn more

What is an SSL/TLS certificate?

Learn more

What is HTTPS?

Learn more

What is the cloud (cloud computing)?

Learn more

What is an Internet backbone?

Learn more

What is the OSI model?

Learn more

What is the Tor network?

Learn more

What is the darknet?

Learn more

What Is the Internet of Things (IoT)?

Learn more

What is a blockchain?

Learn more

What is open source?

Learn more

What is edge computing?

Learn more

What is an e-prescription?

Learn more

What is DNSSEC?

Learn more

What is an autonomous system and what are AS Numbers (ASN)?

Learn more

What is DNS over TLS?

Learn more

What is mTLS?

Learn more

What is geoblocking and geotargeting?

Learn more

Bots

What is a bot?

Learn more

What is bot management?

Learn more

What is a crawler?

Learn more

What is a spambot?

Learn more

What are captchas?

Learn more

Performance

What is a CDN (Content Delivery Network)?

Learn more

What is a web application firewall?

Learn more

What is 5G?

Learn more

Cybersecurity

What is IT security?

Learn more

What is multi-factor authentication?

Learn more

What is a patch?

Learn more

What is the OWASP Top 10?

Learn more

What is the Federal Office for Information Security (BSI)?

Learn more

What is an Identity Provider (IDP)?

Learn more

Data protection & Compliance

IT security & outsourced activities and processes according to MaRisk AT 9

Learn more

IT security as outsourcing according to MaGo and section 32 VAG

Learn more

What is Business Continuity Management (BCM)?

Learn more

What is encryption?

Learn more

ISO 27001 vs. ISO 27001 based on IT-Grundschutz

Learn more

What is DORA (Digital Operational Resilience Act)?

Learn more

What Is an Information Security Management System (ISMS)?

Learn more

What is Privacy Shield?

Learn more

What is IT compliance?

Learn more

What are DiGA?

Learn more

IT security law

Learn more

What are the BAIT?

Learn more

What is a CISO?

Learn more

What is GAIA-X?

Learn more

Threats

What are hype sales bots?

Learn more

What is cart abandonment?

Learn more

What is Skewing

Learn more

What is Web Scraping?

Learn more

What is SQL-Injection?

Learn more

What is cross-site scripting?

Learn more

What is credential stuffing?

Learn more

What is credential cracking?

Learn more

What is a brute-force attack?

Learn more

What is Form Spam?

Learn more

What is malware?

Learn more

What is DNS cache poisoning?

Learn more

What is DNS Spoofing?

Learn more

What is a cyber attack?

Learn more

What is behind Social Engineering?

Learn more

What is whaling?

Learn more

What is cybercrime?

Learn more

What is doxing?

Learn more