EN | PL | ES | IT | RO


Network scanning

is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response.

NIS Directive

Piece of EU legislation regulating for a high common level of cybersecurity and information system across the European Union

Online scam

are different methodologies of Fraud, facilitated by cybercriminals on the Internet. The main purpose of these types of scams can range from credit card theft, capturing user login and password credentials and even identity theft.


Phishing is any kind of messaging campaign planned to redirect the victim towards a particular form, site, or checkout.

Recovery Plan

Recovery is the process that helps businesses to return to normal operations.

Risk Management

the systematic application of policies, procedures and practices to the activities of communication and consulting, establishing the context and assessing, treating, monitoring, reviewing, recording and reporting risk


is the practice of extorting money or sexual favours from someone by threatening to reveal evidence of their sexual activity, usually through messages on the Internet: a nude picture or video of the person.

Security flaw

A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and results in a security breach or a violation of the system's security policy

1 2 3 4 5


team img
team img
team img

team img
team img
team img
The European Commission's support for the production of this publication does not constitute an endorsement of the contents, which reflect the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
Legal description – Creative Commons licensing:
The materials published on the CyberMSME project website are classified as Open Educational Resources' (OER) and can be freely (without permission of their creators): downloaded, used, reused, copied, adapted, and shared by users, with information about the source of their origin.