<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="https://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://www.cybercontact.at/</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/solutions</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/managed-endpoint-protection</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/managed-detect-and-response</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/managed-incident-response</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/siem-security-information-and-event-management</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/cyber-defence-center-cdc-as-a-service</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/managed-threat-intelligence</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/managed-data-leak-detection</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/security-awareness</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/social-engineering-praevention</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/managed-information-security-assessment</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/security-assessment-penetration-test</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/managed-vulnerability-und-compliance</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/managed-technology-resilience</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/managed-chief-information-security-officer</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/managed-information-security-consulting</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/isms-information-security-management-system</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/managed-industrial-zone-security</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/produkte/managed-industrial-security-event-management</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cyber-security-blog</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cyber-security-aktuell-kritische-sicherheitswarnungen</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/kontakt</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/formular-livedemotermin</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/it-sicherheitscheck-fuer-kmu</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/sentinelone-reseller</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cyber-security-unternehmen-informationssicherheit-it-management</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/under-attack</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/was-ist-nis2</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/impressum</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/datenschutz</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/allgemeine-geschaeftsbedingungen</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cyber-sicherheit-unternehmen-kmu</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read-blog/endpoint-protection-erklaert-warum-antivirus-security-allein-fuer-kmu-nicht-mehr-ausreicht</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read-blog/cybersecurity-fuer-kmu-warum-ein-managed-security-service-provider-mssp-oft-die-bessere-wahl-ist</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read-blog/wie-ein-managed-security-services-provider-mssp-ihr-unternehmen-schuetzen-kann</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read-blog/sichere-gastlichkeit-ransomware-schutz-fuer-den-hotelbetrieb</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücken-in-cisco-secure-firewall-produkten-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücken-in-cisco-catalyst-sd-wan-aktiv-ausgenutzt-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-schwachstellen-in-ivanti-endpoint-manager-mobile-updates-empfohlen</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücken-in-mehreren-fortinet-produkten-forticloud-sso-aktiv-ausgenutzt-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/react2shell-angriffe-gegen-verwundbare-anwendungen-auf-von-basis-react-js-und-weiterer-frameworks</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/angriffe-gegen-microsoft-wsus-installationen-update-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/schwerwiegende-sicherheitslücke-in-oracle-e-business-suite-aktiv-ausgenutzt-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/schwerwiegende-sicherheitslücken-in-cisco-adaptive-security-appliance-aktiv-ausgenutzt-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/mehrere-teils-kritische-schwachstellen-in-netscaler-adc-and-netscaler-gateway</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/erhöhte-bedrohungsaktivität-gegen-sonicwall-gen-7-firewalls-mit-sslvpn-sofortmaßnahmen-empfohlen</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücke-in-microsoft-sharepoint-aktiv-ausgenützt-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücke-cve-2025-47981-in-windows-spnego-update-dringend-empfohlen</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/phishing-angriffe-mit-manipulierten-svg-dateien-vorsicht-geboten</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/ivanti-epmm-remote-code-execution-schwachstellen-cve-2025-4427-cve-2025-4428-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücken-in-kubernetes-ingress-nginx-controller-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/ransomware-gruppen-nutzen-weiterhin-kritische-fortinet-schwachstellen-warnung-vor-gepatchten-aber-bereits-kompromittierten-geräten</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücken-in-vmware-esxi-workstation-und-fusion-aktiv-ausgenutzt-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücke-in-sonicwall-sma1000-aktiv-ausgenutzt-update-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/schwerwiegende-sicherheitslücken-in-sonicwall-ssl-vpn-aktiv-ausgenutzt</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücke-in-laravel-framework-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-zero-day-schwachstelle-in-fortimanager-wird-aktiv-ausgenutzt-update-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücke-in-vmware-esxi-aktiv-ausgenutzt-update-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/sicherheitslücke-in-check-point-network-security-gateways-mobile-access-fix-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücken-in-arubaos-updates-verfügbar-1249</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/update3-kritische-sicherheitslücke-in-palo-alto-pan-os-global-protect-aktiv-ausgenützt-patches-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücke-in-palo-alto-pan-os-global-protect</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/update-1-kritische-sicherheitslücke-hintertüre-in-xz-utils-cve-2024-3094</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücke-in-fedora-41-und-fedora-rawhide-bibliothek-xz</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/update-1-kritische-sicherheitslücken-in-fortinet-fortios-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/update-6-kritische-sicherheitslücken-in-ivanti-connect-secure-und-ivanti-policy-secure-aktiv-ausgenützt-patches-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücken-in-mehreren-produkten-von-atlassian-patches-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücke-in-confluence-data-center-und-confluence-server-1255</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/update-1-kritische-sicherheitslücke-in-citrix-netscaler-adc-und-netscaler-gateway-aktiv-ausgenutzt-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/update-2-kritische-sicherheitslücke-in-cisco-ios-xe-aktiv-ausgenützt-1257</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/update-1-sicherheitslücken-teils-kritisch-in-citrix-netscaler-adc-und-gateway-aktiv-ausgenützt-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/weitere-kritische-sicherheitslücke-in-moveit-transfer-workaround-und-patches-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücke-in-fortinet-fortios-und-fortiproxy-ssl-vpn-produkten-aktiv-ausgenutzt-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/update-3-kritische-sicherheitslücke-in-moveit-transfer-weitere-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücken-in-cisco-switches-exploit-code-öffentlich-updates-teilweise-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücken-in-arubaos-und-aruba-instantos-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücke-in-nextcloud-und-nextcloud-enterprise-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücke-in-microsoft-outlook-aktiv-ausgenutzt-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücke-in-fortios-und-fortiproxy-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücken-in-arubaos-updates-teilweise-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/read/kritische-sicherheitslücken-in-clamav-updates-verfügbar</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/access-control-zugangskontrolle</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/access-control-list-acl-zugriffssteuerungsliste</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/access-control-service-zugangskontroll-dienst</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/access-management-zugriffsverwaltung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/access-matrix-zugriffsmatrix</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/account-harvesting-kontosammlung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/ack-piggybacking-ack-piggybacking</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/active-content-aktive-inhalte</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/activity-monitors-aktivitaetsmonitore</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/address-resolution-protocol-adressaufloesungsprotokoll</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/advanced-encryption-standard-aes</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/algorithm-algorithmus</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/applet</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/arpanet-arpanet</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/asymmetric-cryptography-asymmetrische-kryptographie</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/asymmetric-warfare-asymmetrische-kriegsfuehrung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/auditing-ueberpruefung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/authentication-authentifizierung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/authenticity-authentizitaet</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/authorization-autorisierung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/autonomous-system-autonomes-system</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/availability-verfuegbarkeit</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/backdoor-hintertuer</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/bandwidth-bandbreite</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/banner-banner</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/basic-authentication-basisauthentifizierung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/bastion-host</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/bind</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/biometrics-biometrie</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/bit-bit</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/block-cipher-blockchiffre</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/blue-team-blaues-team</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/boot-record-infector-bootsektor-virus</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/border-gateway-protocol-bgp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/botnet-botnetz</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/bridge-bruecke</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/british-standard-7799-britischer-standard-7799</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/broadcast-rundsendung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/broadcast-address-rundsendeadresse</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/browser-browser</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/brute-force-brute-force</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/buffer-overflow-pufferueberlauf</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/business-continuity-plan-bcp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/business-impact-analysis-auswirkungsanalyse</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/byte</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cache-zwischenspeicher</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cache-cramming-cache-manipulation</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cache-poisoning-cache-vergiftung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/call-admission-control-cac-anrufzulassungskontrolle</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/certificate-based-authentication</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cgi-common-gateway-interface</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/chain-of-custody-beweiskette</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/challenge-handshake-authentication-protocol-chap</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/checksum-pruefsumme</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cipher-chiffre</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/ciphertext-chiffretext</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/circuit-switched-network-leitungsvermitteltes-netzwerk</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/client-client</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cloud-computing-cloud-computing</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cold-warm-hot-disaster-recovery-site</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/collision-kollision</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/competitive-intelligence-wettbewerbsintelligenz</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/computer-emergency-response-team-cert</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/computer-network-computernetzwerk</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/confidentiality-vertraulichkeit</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/configuration-management-konfigurationsmanagement</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cookie-cookie</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/corruption-korruption</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cost-benefit-analysis-kosten-nutzen-analyse</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/countermeasure-gegenmassnahme</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/covert-channels-verdeckte-kanaele</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/crimeware-crimeware</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cron</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/crossover-cable-crossover-kabel</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cryptanalysis-kryptoanalyse</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cryptographic-algorithm-or-hash</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cut-through</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/cyclic-redundancy-check-crc</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/daemon</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/data-aggregation-datenaggregation</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/data-custodian-datenverwalter</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/data-encryption-standard-des</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/data-mining</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/data-owner-dateninhaber</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/data-warehousing-data-warehousing</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/datagram-datagramm</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/day-zero-tag-null</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/decapsulation-dekapsulierung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/decryption-entschluesselung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/defacement-defacement</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/defense-in-depth-mehrschichtige-sicherheit</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/demilitarized-zone-dmz-demilitarisierte-zone</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/denial-of-service-dienstverweigerung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/dictionary-attack-woerterbuchangriff</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/diffie-hellman-diffie-hellman</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/digest-authentication-digest-authentifizierung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/digital-certificate-digitales-zertifikat</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/digital-envelope-digitaler-umschlag</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/digital-signature-digitale-signatur</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/digital-signature-algorithm-dsa</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/digital-signature-standard-dss</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/disassembly-dekompilierung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/disaster-recovery-plan-drp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/discretionary-access-control-dac</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/disruption-unterbrechung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/distance-vector-distanzvektor</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/distributed-scans-verteilte-scans</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/domain-hijacking-domain-uebernahme</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/domain-name-domainname</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/domain-name-system-dns</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/due-care-sorgfaltspflicht</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/due-diligence</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/dumpsec-dumpsec</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/dumpster-diving-muelltonnentauchen</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/dynamic-link-library-dynamische-linkbibliothek</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/dynamic-routing-protocol</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/encapsulation-einkapselung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/encryption-verschluesselung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/ephemeral-port-fluechtiger-port</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/escrow-passwords-hinterlegte-passwoerter</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/ethernet-ethernet</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/event-ereignis</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/exponential-backoff-algorithm</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/exposure-offenlegung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/extended-acls-cisco</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/extensible-authentication-protocol-eap</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/exterior-gateway-protocol-egp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/false-rejects-falsche-ablehnungen</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/fast-flux-schneller-flux</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/fault-line-attacks-grenzlinienangriffe</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/file-transfer-protocol-ftp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/filter-filter</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/filtering-router</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/finger-finger</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/fingerprinting-fingerabdruck</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/firewall-firewall</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/flooding-fluten</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/fork-bomb-fork-bombe</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/form-based-authentication</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/forward-lookup</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/forward-proxy</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/fragment-overlap-attack</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/frames-rahmen</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/full-duplex-vollduplex</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/fuzzing-fuzzing</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/gateway-gateway</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/gnu-gnu</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/hardening-haertung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/hash-function-hash-funktion</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/hash-functions-kryptografische-hash-funktionen</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/header-header</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/hijack-attack-hijack-angriff</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/honey-pot-honigtopf</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/honeymonkey-honeymonkey</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/hops-spruenge</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/host-host</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/host-based-id</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/http-proxy-http-proxy</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/https-https</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/hub-hub</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/hybrid-attack-hybrid-angriff</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/hybrid-encryption-hybridverschluesselung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/hypertext-transfer-protocol-http</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/identity-identitaet</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/incident-vorfall</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/incident-handling-vorfallbearbeitung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/incremental-backups-inkrementelle-sicherungen</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/inference-attack-rueckschlussangriff</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/information-warfare-informationskriegsfuehrung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/input-validation-attacks-eingabevalidierungsangriffe</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/integrity-integritaet</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/internet-control-message-protocol-icmp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/internet-engineering-task-force-ietf</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/internet-message-access-protocol-imap</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/internet-protocol-ip</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/internet-protocol-security-ipsec</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/intranet-intranet</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/intrusion-detection-angriffserkennung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/ip-flood-ip-fluten</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/ip-forwarding-ip-weiterleitung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/ip-spoofing-ip-spoofing</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/jump-bag-notfalltasche</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/kerberos-kerberos</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/kernel-kernel</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/layer-2-forwarding-protocol-l2f</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/layer-2-tunneling-protocol-l2tp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/least-privilege-prinzip-der-minimalen-rechtevergabe</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/log-clipping-log-beschneidung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/logic-bombs-logikbomben</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/mac-address-mac-adresse</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/malicious-code-boesartiger-code</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/malware-malware</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/man-in-the-middle-attack-mitm</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/masquerade-attack-maskeradeangriff</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/md5-md5</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/mdr-managed-detect-and-response</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/measures-of-effectiveness-moe</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/monoculture-monokultur</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/morris-worm-morris-wurm</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/msp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/mssp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/multi-cast-multicast</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/multiplexing-multiplexing</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/nat</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/national-institute-of-standards-and-technology-nist</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/network-mapping-netzwerkkartierung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/network-based-ids-netzwerkbasiertes-ids</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/non-repudiation-unbestreitbarkeit</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/null-session-null-sitzung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/one-way-encryption-einwegverschluesselung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/one-way-function-einwegfunktion</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/open-shortest-path-first-ospf</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/osi-osi</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/osi-layers-osi-schichten</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/overload-ueberlastung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/packet-paket</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/packet-switched-network-paketvermitteltes-netzwerk</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/password-authentication-protocol-pap</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/password-cracking-passwort-knacken</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/password-sniffing-passwort-sniffing</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/patch-patch</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/patching-patchen</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/payload-nutzlast</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/penetration-penetration</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/penetration-testing-penetrationstest</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/permutation-permutation</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/personal-firewalls-persoenliche-firewalls</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/pharming-pharming</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/phishing-phishing</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/ping-of-death-ping-of-death</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/ping-scan-ping-scan</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/ping-sweep-ping-sweep</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/point-to-point-protocol-ppp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/point-to-point-tunneling-protocol-pptp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/poison-reverse-poison-reverse</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/polyinstantiation-polyinstantiation</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/polymorphism-polymorphismus</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/port-port</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/port-scan-port-scan</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/post-office-protocol-version-3-pop3</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/preamble-praeambel</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/program-infector-programminfizierer</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/program-policy-programmrichtlinie</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/promiscuous-mode-promiskuitiver-modus</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/proxy-server-proxy-server</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/public-key-oeffentlicher-schluessel</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/public-key-encryption-public-key-verschluesselung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/public-key-infrastructure-pki</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/public-key-forward-secrecy-pfs</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/qaz-qaz</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/race-condition-wettlaufsituation</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/radiation-monitoring-strahlungsueberwachung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/ransomware-ransomware</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/reconnaissance-aufklaerung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/reflexive-acls-cisco</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/response-antwort</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/reverse-address-resolution-protocol-rarp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/reverse-engineering-reverse-engineering</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/reverse-lookup-reverse-lookup</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/reverse-proxy</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/risk-risiko</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/risk-assessment-risikobewertung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/role-based-access-control</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/root</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/rootkit</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/router-router</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/routing-information-protocol-rip</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/routing-loop-routing-schleife</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/rpc-scans</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/secure-shell-ssh</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/secure-sockets-layer-ssl</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/security-policy-sicherheitsrichtlinie</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/session-sitzung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/session-hijacking-sitzungsentfuehrung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/session-key-sitzungsschluessel</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/simple-network-management-protocol-snmp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/simple-security-property</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/smishing-smishing</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/smurf</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/sniffer-sniffer</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/social-engineering-social-engineering</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/socks-socks</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/spoof-spoofing</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/sql-injection-sql-injection</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/stack-mashing-stack-zerstoerung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/stateful-inspection-zustandsgesteuerte-ueberpruefung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/stealthing-tarnung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/steganalysis-steganalyse</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/steganography-steganographie</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/sub-network-teilnetzwerk</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/subnet-mask-subnetzmaske</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/switch</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/switched-network-vermitteltes-netzwerk</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/syn-flood-syn-flood</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/system-security-officer-sso</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/tamper-manipulation</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/tcp-fingerprinting-tcp-fingerabdruck</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/tcp-full-open-scan-tcp-vollstaendiger-open-scan</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/tcp-half-open-scan-tcp-halb-open-scan</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/tcp-ip</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/tcpdump</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/telnet</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/threat-bedrohung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/threat-assessment-bedrohungsbewertung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/threat-model-bedrohungsmodell</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/threat-vector-bedrohungsvektor</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/tiny-fragment-attack</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/token-ring</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/token-based-access-control</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/token-based-devices-token-basierte-geraete</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/topology-topologie</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/traceroute</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/transmission-control-protocol-tcp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/transport-layer-security-tls</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/triple-des</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/trojan-horse-trojanisches-pferd</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/trusted-ports-vertrauenswuerdige-ports</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/tunnel-tunnelverbindung</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/user-datagram-protocol-udp</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/virtual-private-network-vpn</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/virus-computervirus</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/vishing-voice-phishing</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/voice-firewall</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/voice-intrusion-prevention-system-ips</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/war-chalking</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/war-dialer-automatisierte-modemsuche</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/war-driving-suche-nach-wlan-netzen-waehrend-der-fahrt</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/managed-endpoint-protection</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/web-of-trust-vertrauensnetzwerk</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/wiretapping-abhoeren-von-datenverkehr</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/worm-wurmvirus</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/zero-day-tag-null-unbekannte-sicherheitsluecke</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/zero-day-attack-zero-day-angriff</loc>
  </url>
  <url>
    <loc>https://www.cybercontact.at/cybersecurity-glossar/zombies-zombie-computer</loc>
  </url>
</urlset>
