0
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
View full resource
Register for free tools and resources
Build free Mind Maps, Flashcards, Quizzes and Notes
Create, discover and share resources
Print & Pin great learning resources
Register Now
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":1,"sizes":"[[[1200, 0], [[728, 90]]], [[0, 0], [[468, 60], [234, 60], [336, 280], [300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":1},{"key":"uauth","value":"f"},{"key":"ulang","value":"en_us"}]}
7278218
SEGURIDAD INFORMATICA
Mind Map by
Tonny Gonzalez
, updated more than 1 year ago
More
Less
Created by
Tonny Gonzalez
almost 3 years ago
29
0
0
Description
MAPA CONCEPTUAL DE SEGURIDAD INFORMATICA
No tags specified
francisco
maravilla
castro
tu
yo
Resource summary
SEGURIDAD INFORMATICA
1 SEGURIDAD FISICA
1.1 CONTROL DE ACCESO
1.2 SYSTEMAS BIOMETRICOS
1.3 PROTECCION ELECTRONICA
1.4 CONDICIONES AMBIENTALES
1.5
2 SEGURIDAD LOGICA
2.1 TECNICAS DE CONTROL DE ACCESO
2.2 IDENTIFICACION Y AUTENTIFICACION
2.3 PASSWORD SEGURAS
2.4 LIMITACIONES A LOS SERVICIOS
2.5 SOFTWARE DE SEGURRIDAD
2.5.1 SOFTWARE MALICIOSO
2.5.1.1 CLASIFICACION DE TIPOS DE VIRUS
2.5.1.1.1 SEGUN SU CAPACIDAD DE PROPAGACION
2.5.1.1.1.1 GUSANOS
2.5.1.1.1.2 TROYANOS
2.5.1.1.2 SEGUN LAS ACCIONES QUE REALIZA
2.5.1.1.2.1 EXPLOIT
2.5.1.1.2.2 BLOQUEADOR
2.5.1.1.2.3 KEYLOGGER
2.5.1.1.2.4 CLICKER
2.5.1.1.2.5 CRIPTOVIRUS
2.5.2 CORTAFUEGOS
2.5.2.1 POLITICA RESTRICTICA
2.5.2.2 POLITICA PERMISIVA
2.5.3 CRIPTOGRAFIA ASIMETRICA
2.5.3.1 CLAVES PRIVADAS
2.5.3.1.1
2.5.3.2 CLAVE PUBLICA
2.5.3.2.1 CIFRADO DE CLAVE PUBLICA
2.5.3.2.1.1 FIRMA DIGITAL
2.5.3.2.1.2 CERTIFICADOS DIGITALES
Show full summary
Hide full summary
Similar
{"ad_unit_id":"App_Resource_Sidebar_Lower","width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"ulang","value":"en_us"}]}
Seguridad en la red
Diego Santos
MAPAS CONCEPTUALES
mario castro
PRINCIPIOS DE SEGURIDAD INFORMÁTICA
Marisol Monroy
Test de Aminoácidos
Vicente Henriquez
Sociedad y estado
Carlos Castro Mendoza
CIBERSEGURIDAD
ANDREASANV
seguridad informatica
jorge beyer martin
América Latina durante la Guerra Fría
Javier R
Aplicación de buenas prácticas de seguridad de la red Internet.
geovany xochipiltecalt
Mapa mental - Mercado.
alejohernandez
Auditoría de Sistemas
Jorge Andrés Cardona Muñoz
Browse Library
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":2,"sizes":"[[[0, 0], [[970, 250], [970, 90], [728, 90]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":2},{"key":"uauth","value":"f"},{"key":"ulang","value":"en_us"}]}