Cybersecurity

Description

Mapa mental sobre el ensayo de Eduardo Gelbstein
CARLOS JOSE LOPEZ TORT
Mind Map by CARLOS JOSE LOPEZ TORT, updated more than 1 year ago
CARLOS JOSE LOPEZ TORT
Created by CARLOS JOSE LOPEZ TORT about 6 years ago
33
0

Resource summary

Cybersecurity
  1. Internet
    1. Critical Component
      1. Malware affects information
        1. unauthorised disclosure and modification
        2. Computers
          1. Data Networks
            1. Data communications
              1. One piece of the Internet governance puzzle.
                1. Trends towards
                  1. Not easily measurable
                  2. Problems
                    1. Imperfect technologies
                      1. digital circuits
                        1. process and store data
                        2. operating system software
                          1. free of errors
                          2. applications software
                            1. free of errors
                            2. Remedies
                              1. Perhaps
                                1. Questionable assurances
                                  1. limited warranty
                                    1. accept no liability
                                2. Imperfect information
                                  1. backing up data
                                    1. separate
                                      1. product updates
                                        1. Complex processes
                                          1. information security
                                            1. Remedies
                                              1. Hardly
                                                1. change in corporate
                                                  1. business value of information
                                                    1. implications of unauthorised disclosures
                                                  2. malicious software
                                                  3. Insufficient awareness
                                                    1. human factors
                                                      1. social engineering
                                                        1. disclose confidential information
                                                          1. money
                                                            1. poor digital hygiene
                                                              1. malicious software
                                                                1. Remedies
                                                                  1. Hard to tell
                                                                    1. Education
                                                                      1. awareness programmes
                                                                        1. briefings
                                                                          1. security chain
                                                                            1. human element
                                                                        2. Knowledgeable attackers
                                                                          1. break into computer
                                                                            1. Motivation
                                                                              1. Fun
                                                                                1. Activism
                                                                                  1. Fraud
                                                                                    1. Sabotage
                                                                                      1. Disruption
                                                                                        1. Espionage
                                                                                          1. Military
                                                                                            1. Terrorism
                                                                                            2. share information
                                                                                              1. Malicious software
                                                                                                1. investment in technology
                                                                                                  1. not destructive
                                                                                                    1. Remedies
                                                                                                      1. No, not for now.
                                                                                                        1. defending the corporate world
                                                                                                          1. unclear jurisdictions
                                                                                                            1. no boundaries
                                                                                                              1. prosecuting
                                                                                                                1. not a practical proposition
                                                                                                            2. Imperfect execution
                                                                                                              1. Initial
                                                                                                                1. undocumented
                                                                                                                2. Repeatable
                                                                                                                  1. documented sufficiently to allow its steps to be repeated.
                                                                                                                  2. Defined
                                                                                                                    1. confirmed as a standard business process
                                                                                                                    2. Managed
                                                                                                                      1. quantitatively managed relying on agreed metrics and targets
                                                                                                                      2. Optimised
                                                                                                                        1. review and improvement
                                                                                                                        2. Remedies
                                                                                                                          1. Perhaps
                                                                                                                            1. information security
                                                                                                                              1. subject to effective governance
                                                                                                                        3. Malware
                                                                                                                          1. DDoS attack
                                                                                                                            1. US$100
                                                                                                                            2. Kaspersky
                                                                                                                              1. Leader in anti-virus software
                                                                                                                              2. Data stolen
                                                                                                                                1. Financial loss
                                                                                                                                  1. Cyber-breaches
                                                                                                                                    1. Loss of confidentiality
                                                                                                                                    2. Internet governance
                                                                                                                                      1. Individuals
                                                                                                                                        1. improve their personal digital hygiene
                                                                                                                                          1. being prudent in their actions in cyber space
                                                                                                                                          2. Organisations
                                                                                                                                            1. relying on information systems
                                                                                                                                              1. ake good care of their data
                                                                                                                                              2. Governments
                                                                                                                                                1. legislation
                                                                                                                                                  1. cyber defence
                                                                                                                                                    1. critical infrastructures
                                                                                                                                                    2. national defence
                                                                                                                                                      1. law enforcemen
                                                                                                                                                        1. investigative capabilities
                                                                                                                                                        2. International
                                                                                                                                                          1. sharing intelligence
                                                                                                                                                            1. cyber peace
                                                                                                                                                              1. treaties
                                                                                                                                                                1. mutual assistance
                                                                                                                                                              Show full summary Hide full summary

                                                                                                                                                              Similar

                                                                                                                                                              FUNDAMENTOS DE REDES DE COMPUTADORAS
                                                                                                                                                              anhita
                                                                                                                                                              Test: "La computadora y sus partes"
                                                                                                                                                              Dayana Quiros R
                                                                                                                                                              Abreviaciones comunes en programación web
                                                                                                                                                              Diego Santos
                                                                                                                                                              Seguridad en la red
                                                                                                                                                              Diego Santos
                                                                                                                                                              Excel Básico-Intermedio
                                                                                                                                                              Diego Santos
                                                                                                                                                              Evolución de la Informática
                                                                                                                                                              Diego Santos
                                                                                                                                                              Introducción a la Ingeniería de Software
                                                                                                                                                              David Pacheco Ji
                                                                                                                                                              Conceptos básicos de redes
                                                                                                                                                              ARISAI DARIO BARRAGAN LOPEZ
                                                                                                                                                              La ingenieria de requerimientos
                                                                                                                                                              Sergio Abdiel He
                                                                                                                                                              TECNOLOGÍA TAREA
                                                                                                                                                              Denisse Alcalá P
                                                                                                                                                              Navegadores de Internet
                                                                                                                                                              M Siller