Cybersecurity

Description

MIS Mind Map on Cybersecurity, created by Thomas Abraham on 23/04/2018.
Thomas Abraham
Mind Map by Thomas Abraham, updated 30 days ago
Thomas Abraham
Created by Thomas Abraham over 7 years ago
462
0

Resource summary

Cybersecurity
  1. Hacking Tools
    1. Crime as a Service
      1. Malware
        1. Social engineering
          1. Phishing/smishing/vishing
          2. Man-in-the-middle (MITM)
          3. Threats
            1. Crime
              1. Insiders
                1. Hackers
                  1. Terrorists/Governments
                  2. Natural Disasters
                    1. Human Error
                    2. Safeguards
                      1. Technical
                        1. Authentication
                          1. Encryption
                            1. Firewalls
                              1. Host hardening
                              2. Data
                                1. Policies
                                2. Human
                                  1. Positions
                                    1. Hiring
                                      1. Training
                                        1. Termination
                                      2. Loss/Goals
                                        1. Data Loss (Confidentiality)
                                          1. Identity theft
                                            1. Disclosures
                                              1. Policy violations
                                              2. System Failure (Availability)
                                                1. Denial of service
                                                2. Loss of Infrastructure (Integrity)
                                                  1. APTs
                                                    1. Cyberwar
                                                  2. Managing risk
                                                    1. Tradeoffs
                                                      1. Security policy
                                                        1. Security process
                                                          1. NIST Framework
                                                        2. Breaches
                                                          Show full summary Hide full summary

                                                          Similar

                                                          CCNA Security 210-260 IINS - Exam 3
                                                          Mike M
                                                          CCNA Security Final Exam
                                                          Maikel Degrande
                                                          Spyware
                                                          Sam2
                                                          Professional, Legal, and Ethical Issues in Information Security
                                                          mfundo.falteni
                                                          CyberSecurity
                                                          Stephen Williamson
                                                          Security Policies
                                                          indysingh7285
                                                          McAfee Advance Threat Defense - Training Quiz
                                                          esnlalan
                                                          Cisco IT Essentials 7.0 | Chapter 13: Security Exam
                                                          dksajpigbdu asdfagdsga
                                                          FIT3031 - Network Security Exam Practice
                                                          Nicholas Bagnall
                                                          The Vulnerability–Threat–Control Paradigm
                                                          Steve Ramirez
                                                          Managing Information Systems
                                                          Clair Hat