1. Introduction

Get Started. It's Free
or sign up with your email address
Rocket clouds
1. Introduction by Mind Map: 1. Introduction

1. 1. Learning Objectives

1.1. Overview of security challenges (Kind of adversaries, motivations & drivers)

2. 2. Government & Cybersecurity

3. 3. Kind of Attackers

3.1. The kind of attacker determines the amount of resources they have, their target and intensity of attack

4. 4. Attack Vectors & Attack Surface

5. 5. Trinity of Trouble

6. 7. Security Incidents Taxonomy

7. 8. Case Studies: Heartland Payment System + Target Data Breach

8. 9. Principles of Easiest Penetration + Weakest Link ***

9. 10. Security Objectives

10. 6. Data/Info Security

11. 11. NIST Engineering Principles Recommendations