Get Started. It's Free
or sign up with your email address
Cybersecurity by Mind Map: Cybersecurity

1. Threat agents

1.1. Motives

1.1.1. Religious

1.1.2. Political

1.1.3. Economical

1.2. Capabilities

1.2.1. Knowledge

1.2.2. Funding

1.2.3. Size

1.3. Intentions

1.3.1. Fun

1.3.2. Crime

1.3.3. Espionage

2. 7.Stakeholders

2.1. 7.3. Providers

2.1.1. Service Providers (Internet, Application)

2.1.2. Suppliers

2.1.3. CII

2.1.4. Organizations Private Public

2.2. 7.2. Consumers

2.2.1. Individuals Customers

2.2.2. Organisations Private Employees Public Employees

2.3. Governments & regulatory authorities

2.4. Investors and shareholders

2.5. Hackers

3. Assets

3.1. Organizational

3.1.1. Threats Embarrassment through website defacement Cyber-squatters Information leaks Governamental Corporations Terrorism

3.1.2. Vulnerabilities Information Vulnerabilities in ICT

3.1.3. Controls Technical Firewall, IDP, IPS Organizational Policies Awareness Management Insurance SLAs Supply chain management

3.1.4. Physical Facilities People Human

3.1.5. Virtual People Identity Personal data Virtual currency Information Services Business processes Financial information Intellectual Property Domain, website, software Facilities CII Electricity Technology Data hosting Cloud services Stakeholders Interests Dependencies Supply chains

3.2. Personal

3.2.1. Threats Leakage or theft of personal information Zombie or bot Fraud Bullying

3.2.2. Vulnerabilities Information Vulnerabilities in ICT

3.2.3. Controls Technical Firewall Antivirus Organizational Awareness ISPs

3.2.4. Physical People Human Facilities Home Technology Devices

3.2.5. Virtual Online identity Avatars Online credit information References in virtual worlds Virtual currency