Computer Security

azamuddin
Mind Map by , created over 5 years ago

BSIP (ECIH) Mind Map on Computer Security, created by azamuddin on 05/24/2014.

216
1
0
Tags No tags specified
azamuddin
Created by azamuddin over 5 years ago
HRCI Glossary of Terms O-Z
Sandra Reed
Certification Prep_1
Tonya Franklin
Biology B1.3
raffia.khalid99
Memory-boosting tips for students
Micheal Heffernan
Část 2.
Gábi Krsková
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
SSCP Domains
Abdul Issa
Computer Security Potential Flaws
Rob Speirs
Risk Assessment
azamuddin
Cell Structure
megan.radcliffe16
Computer Security
1 A.2 Operational Categories
1.1 Prevention
1.1.1 create information security policy
1.1.2 User Training
1.1.3 Access Control
1.1.4 Firewall
1.2 Detection
1.2.1 Whistle Blower
1.2.2 Intrusion Detection System
1.2.3 Integrity Assurance Software
1.3 Respond
1.3.1 unpluggin Network Cable
1.3.2 Blocking IP Address
1.4 Recovery
1.4.1 Disk Mirorring
1.4.2 Automated Backup
2 A.1 Computer Security Incident
2.1 A.1.1 Characteristic
2.1.1 The Attacker or Origin
2.1.2 Tools Used
2.1.3 Vulnerability Exploited
2.1.4 Action Performed
2.1.5 Intended Target
2.1.6 Unauthorized Result
2.1.7 Attack Objectives
2.2 A.1.3 CSIRT
2.2.1 Why Need? Benefit?
2.2.1.1 Economic
2.2.1.2 Public Relation
2.2.1.3 Legal
2.2.2 Goal & Objective
2.2.3 Activities
2.2.3.1 Non Real Time
2.2.3.1.1 Pre Incident
2.2.3.1.1.1 Charter
2.2.3.1.1.1.1 Mission Statement
2.2.3.1.1.1.2 types of incidents - A.1.2
2.2.3.1.1.1.3 service provided
2.2.3.1.1.1.4 constituenty
2.2.3.1.1.1.5 Authority & Funding
2.2.3.1.1.2 Policy
2.2.3.1.1.3 Incident Reporting Procedures
2.2.3.1.1.3.1 PoC
2.2.3.1.1.3.1.1 Various Contact types
2.2.3.1.1.3.1.2 Team members
2.2.3.1.1.3.1.3 Work hours
2.2.3.1.1.3.1.4 Time Zone
2.2.3.1.1.3.2 Who report?
2.2.3.1.1.3.3 Incident Symptom awareness
2.2.3.1.1.4 Incident Tracking & Handling Procedure
2.2.3.1.2 Post Incident
2.2.3.2 Real Time
2.2.3.2.1 Incident Handling
2.2.3.2.1.1 Identify Incident
2.2.3.2.1.1.1 determine actual incident
2.2.3.2.1.1.2 verify, security or non-security?
2.2.3.2.1.1.3 Incident Prioritization
2.2.3.2.1.2 Containtment
2.2.3.2.1.3 Eradicate
2.2.3.2.2 Incident Recovery
2.2.3.2.2.1 Identify Damage
2.2.3.2.2.2 Repair System
2.2.3.2.2.3 Restore System
2.2.3.2.3 Investigation
2.2.3.2.3.1 Identify Cause
2.2.3.2.3.1.1 Forensic
2.2.3.2.3.2 Collect Evidence
2.2.3.2.3.2.1 Volatile
2.2.3.2.3.2.2 Non Volatile
2.2.3.2.3.3 Assign Blame
2.2.3.2.4 reoccurrence prevvention
2.2.3.2.5 Restitution
2.2.3.2.6 Communication
2.3 A.1.2 Types and Categories of CSI
2.3.1 Service Interrupts
2.3.2 System Interferrence
2.3.3 Unauthorized Access
2.3.4 Commercial use
2.3.5 Malicious Communication
2.3.6 Theft
2.3.7 Unsolicitated Bulk Mail
2.3.8 Other

Media attachments