Data-centric Security

Description

Mind map of encryption scenarios
Michael Mihalik
Mind Map by Michael Mihalik, updated more than 1 year ago
Michael Mihalik
Created by Michael Mihalik over 6 years ago
20
0

Resource summary

Data-centric Security
  1. Discovery
    1. Classification
      1. Unstructured
        1. Users
          1. Non-Public
            1. Encryption
              1. Data in Motion
                1. Data at Rest
                  1. Key Management
                  2. Access Controls
                    1. Identity Management
                      1. Entitlements
                        1. Entitlement Reviews
                          1. Least Privilege
                            1. Need to Know
                            2. Log Management
                              1. Auditing
                              2. Privileged Users
                            3. Data Loss Prevention
                              1. Removable Media
                                1. Personal Email
                                  1. Email
                                    1. Instant Messaging
                                      1. Social Media
                                        1. Cloud Storage
                                          1. File Transfer Protocols
                                            1. Log Management
                                              1. Auditing
                                            2. Masking
                                              1. Data in Use
                                              2. Log Management
                                                1. Auditing
                                              3. Policies & Procedures
                                                1. Awareness Training
                                                  1. Notifications
                                                    1. Passwords
                                                2. Structured
                                                  1. Applications
                                                    1. Non-Public
                                                      1. Encryption
                                                        1. Data In Motion
                                                          1. Data In Use
                                                            1. Key Management
                                                              1. Data in Transit
                                                              2. Privileged Users
                                                                1. Data at Rest
                                                                  1. Data Loss Prevention
                                                                    1. Email
                                                                      1. Personal Email
                                                                        1. Instant Messaging
                                                                          1. Social Media
                                                                            1. Cloud Storage
                                                                              1. File Transfer Protocols
                                                                                1. Log Management
                                                                                  1. Auditing
                                                                              2. Policies & Procedures
                                                                                1. Awareness Training
                                                                                  1. Provisioning
                                                                                    1. Passwords
                                                                                      1. Session Recording
                                                                                      2. Separation of Duties
                                                                                    2. Vulnerability Testing
                                                                                      1. Patch Management
                                                                                2. Risk Assessment
                                                                                  Show full summary Hide full summary

                                                                                  Similar

                                                                                  CCNA Security 210-260 IINS - Exam 3
                                                                                  Mike M
                                                                                  CCNA Security Final Exam
                                                                                  Maikel Degrande
                                                                                  Spyware
                                                                                  Sam2
                                                                                  Professional, Legal, and Ethical Issues in Information Security
                                                                                  mfundo.falteni
                                                                                  CyberSecurity
                                                                                  Stephen Williamson
                                                                                  Security Policies
                                                                                  indysingh7285
                                                                                  McAfee Advance Threat Defense - Training Quiz
                                                                                  esnlalan
                                                                                  Computer Security
                                                                                  Mr A Esch
                                                                                  Cisco IT Essentials 7.0 | Chapter 13: Security Exam
                                                                                  dksajpigbdu asdfagdsga
                                                                                  FIT3031 - Network Security Exam Practice
                                                                                  Nicholas Bagnall
                                                                                  The Vulnerability–Threat–Control Paradigm
                                                                                  Steve Ramirez