Data-centric Security

Descrição

Mind map of encryption scenarios
Michael Mihalik
Mapa Mental por Michael Mihalik, atualizado more than 1 year ago
Michael Mihalik
Criado por Michael Mihalik quase 7 anos atrás
20
0

Resumo de Recurso

Data-centric Security
  1. Discovery
    1. Classification
      1. Unstructured
        1. Users
          1. Non-Public
            1. Encryption
              1. Data in Motion
                1. Data at Rest
                  1. Key Management
                  2. Access Controls
                    1. Identity Management
                      1. Entitlements
                        1. Entitlement Reviews
                          1. Least Privilege
                            1. Need to Know
                            2. Log Management
                              1. Auditing
                              2. Privileged Users
                            3. Data Loss Prevention
                              1. Removable Media
                                1. Personal Email
                                  1. Email
                                    1. Instant Messaging
                                      1. Social Media
                                        1. Cloud Storage
                                          1. File Transfer Protocols
                                            1. Log Management
                                              1. Auditing
                                            2. Masking
                                              1. Data in Use
                                              2. Log Management
                                                1. Auditing
                                              3. Policies & Procedures
                                                1. Awareness Training
                                                  1. Notifications
                                                    1. Passwords
                                                2. Structured
                                                  1. Applications
                                                    1. Non-Public
                                                      1. Encryption
                                                        1. Data In Motion
                                                          1. Data In Use
                                                            1. Key Management
                                                              1. Data in Transit
                                                              2. Privileged Users
                                                                1. Data at Rest
                                                                  1. Data Loss Prevention
                                                                    1. Email
                                                                      1. Personal Email
                                                                        1. Instant Messaging
                                                                          1. Social Media
                                                                            1. Cloud Storage
                                                                              1. File Transfer Protocols
                                                                                1. Log Management
                                                                                  1. Auditing
                                                                              2. Policies & Procedures
                                                                                1. Awareness Training
                                                                                  1. Provisioning
                                                                                    1. Passwords
                                                                                      1. Session Recording
                                                                                      2. Separation of Duties
                                                                                    2. Vulnerability Testing
                                                                                      1. Patch Management
                                                                                2. Risk Assessment

                                                                                  Semelhante

                                                                                  CCNA Security 210-260 IINS - Exam 3
                                                                                  Mike M
                                                                                  CCNA Security Final Exam
                                                                                  Maikel Degrande
                                                                                  Spyware
                                                                                  Sam2
                                                                                  Professional, Legal, and Ethical Issues in Information Security
                                                                                  mfundo.falteni
                                                                                  CyberSecurity
                                                                                  Stephen Williamson
                                                                                  Security Policies
                                                                                  indysingh7285
                                                                                  McAfee Advance Threat Defense - Training Quiz
                                                                                  esnlalan
                                                                                  Computer Security
                                                                                  Mr A Esch
                                                                                  Cisco IT Essentials 7.0 | Chapter 13: Security Exam
                                                                                  dksajpigbdu asdfagdsga
                                                                                  FIT3031 - Network Security Exam Practice
                                                                                  Nicholas Bagnall
                                                                                  The Vulnerability–Threat–Control Paradigm
                                                                                  Steve Ramirez