0
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":4162817,"author_id":1628485,"title":"RIESGOS INFORMATICOS","created_at":"2015-12-02T03:12:54Z","updated_at":"2016-10-14T00:31:32Z","sample":false,"description":"MAPA MENTAL DE RIESGOS INFORMATICOS","alerts_enabled":false,"cached_tag_list":"pedro, viviana, diana","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":26,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["pedro","viviana","diana"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/4162817","folder_id":2431462,"public_author":{"id":1628485,"profile":{"name":"katherine_00","about":null,"avatar_service":"gravatar","locale":"es-ES","google_author_link":null,"user_type_id":247,"escaped_name":"paola nempeque","full_name":"paola nempeque","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":4162817,"author_id":1628485,"title":"RIESGOS INFORMATICOS","created_at":"2015-12-02T03:12:54Z","updated_at":"2016-10-14T00:31:32Z","sample":false,"description":"MAPA MENTAL DE RIESGOS INFORMATICOS","alerts_enabled":false,"cached_tag_list":"pedro, viviana, diana","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":26,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["pedro","viviana","diana"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/4162817","folder_id":2431462,"public_author":{"id":1628485,"profile":{"name":"katherine_00","about":null,"avatar_service":"gravatar","locale":"es-ES","google_author_link":null,"user_type_id":247,"escaped_name":"paola nempeque","full_name":"paola nempeque","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Next up
Copy and Edit
Register for free tools and resources
Build free Mind Maps, Flashcards, Quizzes and Notes
Create, discover and share resources
Print & Pin great learning resources
Register Now
4162817
RIESGOS INFORMATICOS
Mind Map by
paola nempeque
, updated more than 1 year ago
More
Less
Created by
paola nempeque
about 5 years ago
12
0
0
Description
MAPA MENTAL DE RIESGOS INFORMATICOS
No tags specified
pedro
viviana
diana
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":1,"sizes":"[[[1200, 0], [[728, 90]]], [[0, 0], [[468, 60], [234, 60], [336, 280], [300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Resource summary
RIESGOS INFORMATICOS
1 INTEGRIDAD
1.1 Manipulacion de las herramientas de seguridad para mitigar las evidencias.
1.2 Uso de la inteligencia peparada de personas retiradas.
1.3 Copia de informacion de la empresa usada para la venta a la competencia.
1.4 Informacion valiosa en la basura
2 DE RELACION
2.1 Se encuentran sobornos a los colaboradores por parte de la competencia.
2.2 Alteración de información confidencial que provoca la toma errada de decisiones.
2.3 Nuevas herramientas para jaqueo e inserción de virus a la compañía.
3 DE ACCESO
3.1 Vulnerabilidad de datos, dinero e información.
3.2 Perdida de control de la compañía que provocaría hasta la quiebra.
3.3 Transferencia de tecnología y aplicativos.
4 DE UTILIDAD
4.1 Virus que provocan la pérdida y copia de información valiosa.
4.2 Interceptación de líneas, aplicativos y satelitales.
4.3 Jaqueo de computadores con información exclusiva.
5 DE INFRAESTRUCTURA
5.1 Suplantacion de personal autorizado.
5.2 vulnerabilidad de base de datos, cuentas etc.
6 NUEVAS TECNOLOGIAS
6.1 Virus con propios protocolos que no pueden ser bloqueados.
6.2 Herramientas que logran interceptar la fibra.
6.3 Bajos precios en la adquisición.
6.4 Anuladores de frecuencias.
Media attachments
32c03d61-4935-48b9-baab-ae8868e2201d.jpg (image/jpg)
8731a1c6-af0b-4337-9ce0-bb44ee168b1e.jpeg (image/jpeg)
2baabe77-1b26-4e2d-ad97-05c8a7f3e7f6.jpg (image/jpg)
8253b35d-bbd0-4a01-8144-4fbbb003ac69.jpg (image/jpg)
093804fe-3ec7-40af-b017-8dfedd4de143.jpg (image/jpg)
b1aa5184-a253-43ae-9f6d-b838376d3e05.jpg (image/jpg)
cd8196df-4765-4fbd-a60e-50e5949769dc.jpg (image/jpg)
Show full summary
Hide full summary
Similar
FORMATOS NORMALIZADOS
pedro gutierrez
SUB ESPACIO VECTORIAL
pedro gutierrez
CONTENIDO TEMÁTICO UNIDAD 3
pedro gutierrez
ESPACIO VECTORIAL
pedro gutierrez
VULNERABILIDAD, AMENAZA, RIESGOS Y CONTROLES INFORMATICOS
Mauricio Fernandez
IUSNATURALISMO
Diana Karen Gonzalez Galarce
Normas de Convivencia
noeliaicatt
principales acontecimientos de los evangelios
Victor Rosales
PREPARACIÓN DE PRESUPUESTO
KARLA VIVIANA AG
Competencias Ciudadanas 9° - 2016
Mr. FadouX
Diagnostico social
mileidy bedoya
Browse Library
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":2,"sizes":"[[[0, 0], [[970, 250], [970, 90], [728, 90]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":2},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}