Computer Security

Description

BSIP (ECIH) Mind Map on Computer Security, created by azamuddin on 24/05/2014.
azamuddin
Mind Map by azamuddin, updated more than 1 year ago
azamuddin
Created by azamuddin about 11 years ago
260
1
1 2 3 4 5 (2)

Resource summary

Computer Security
  1. A.2 Operational Categories
    1. Prevention
      1. create information security policy
        1. User Training
          1. Access Control
            1. Firewall
            2. Detection
              1. Whistle Blower
                1. Intrusion Detection System
                  1. Integrity Assurance Software
                  2. Respond
                    1. unpluggin Network Cable
                      1. Blocking IP Address
                      2. Recovery
                        1. Disk Mirorring
                          1. Automated Backup
                        2. A.1 Computer Security Incident
                          1. A.1.1 Characteristic
                            1. The Attacker or Origin
                              1. Tools Used
                                1. Vulnerability Exploited
                                  1. Action Performed
                                    1. Intended Target
                                      1. Unauthorized Result
                                        1. Attack Objectives
                                        2. A.1.3 CSIRT
                                          1. Why Need? Benefit?
                                            1. Economic
                                              1. Public Relation
                                                1. Legal
                                                2. Goal & Objective
                                                  1. Activities
                                                    1. Non Real Time
                                                      1. Pre Incident
                                                        1. Charter
                                                          1. Mission Statement
                                                            1. types of incidents - A.1.2
                                                              1. service provided
                                                                1. constituenty
                                                                  1. Authority & Funding
                                                                  2. Policy
                                                                    1. Incident Reporting Procedures
                                                                      1. PoC
                                                                        1. Various Contact types
                                                                          1. Team members
                                                                            1. Work hours
                                                                              1. Time Zone
                                                                              2. Who report?
                                                                                1. Incident Symptom awareness
                                                                                2. Incident Tracking & Handling Procedure
                                                                                3. Post Incident
                                                                                4. Real Time
                                                                                  1. Incident Handling
                                                                                    1. Identify Incident
                                                                                      1. determine actual incident
                                                                                        1. verify, security or non-security?
                                                                                          1. Incident Prioritization
                                                                                          2. Containtment
                                                                                            1. Eradicate
                                                                                            2. Incident Recovery
                                                                                              1. Identify Damage
                                                                                                1. Repair System
                                                                                                  1. Restore System
                                                                                                  2. Investigation
                                                                                                    1. Identify Cause
                                                                                                      1. Forensic
                                                                                                      2. Collect Evidence
                                                                                                        1. Volatile
                                                                                                          1. Non Volatile
                                                                                                          2. Assign Blame
                                                                                                          3. reoccurrence prevvention
                                                                                                            1. Restitution
                                                                                                              1. Communication
                                                                                                          4. A.1.2 Types and Categories of CSI
                                                                                                            1. Service Interrupts
                                                                                                              1. System Interferrence
                                                                                                                1. Unauthorized Access
                                                                                                                  1. Commercial use
                                                                                                                    1. Malicious Communication
                                                                                                                      1. Theft
                                                                                                                        1. Unsolicitated Bulk Mail
                                                                                                                          1. Other
                                                                                                                        Show full summary Hide full summary

                                                                                                                        0 comments

                                                                                                                        There are no comments, be the first and leave one below:

                                                                                                                        Similar

                                                                                                                        SSCP Domains
                                                                                                                        Abdul Issa
                                                                                                                        Computer Security Potential Flaws
                                                                                                                        Rob Speirs
                                                                                                                        Risk Assessment
                                                                                                                        azamuddin
                                                                                                                        A-Level Economics: Supply and Demand
                                                                                                                        cian.buckley+1
                                                                                                                        BIOLOGY B1 4
                                                                                                                        x_clairey_x
                                                                                                                        AS Psychology - Research Methods
                                                                                                                        kirstygribbin
                                                                                                                        Henry VIII - Annulment and Divorce
                                                                                                                        Eva Clifton
                                                                                                                        Matters of Life and Death GCSE
                                                                                                                        kate.siena
                                                                                                                        Geography: Population
                                                                                                                        ameliaalice
                                                                                                                        Renal System A&P
                                                                                                                        Kirsty Jayne Buckley