Cybersecurity

Get Started. It's Free
or sign up with your email address
Rocket clouds
Cybersecurity by Mind Map: Cybersecurity

1. Threat agents

1.1. Motives

1.1.1. Religious

1.1.2. Political

1.1.3. Economical

1.2. Capabilities

1.2.1. Knowledge

1.2.2. Funding

1.2.3. Size

1.3. Intentions

1.3.1. Fun

1.3.2. Crime

1.3.3. Espionage

2. 7.Stakeholders

2.1. 7.3. Providers

2.1.1. Service Providers (Internet, Application)

2.1.2. Suppliers

2.1.3. CII

2.1.4. Organizations

2.1.4.1. Private

2.1.4.2. Public

2.2. 7.2. Consumers

2.2.1. Individuals

2.2.1.1. Customers

2.2.2. Organisations

2.2.2.1. Private

2.2.2.1.1. Employees

2.2.2.2. Public

2.2.2.2.1. Employees

2.3. Governments & regulatory authorities

2.4. Investors and shareholders

2.5. Hackers

3. Assets

3.1. Organizational

3.1.1. Threats

3.1.1.1. Embarrassment through website defacement

3.1.1.2. Cyber-squatters

3.1.1.3. Information leaks

3.1.1.3.1. Governamental

3.1.1.3.2. Corporations

3.1.1.4. Terrorism

3.1.2. Vulnerabilities

3.1.2.1. Information

3.1.2.2. Vulnerabilities in ICT

3.1.3. Controls

3.1.3.1. Technical

3.1.3.1.1. Firewall, IDP, IPS

3.1.3.2. Organizational

3.1.3.2.1. Policies

3.1.3.2.2. Awareness

3.1.3.3. Management

3.1.3.3.1. Insurance

3.1.3.3.2. SLAs

3.1.3.3.3. Supply chain management

3.1.4. Physical

3.1.4.1. Facilities

3.1.4.2. People

3.1.4.2.1. Human

3.1.5. Virtual

3.1.5.1. People

3.1.5.1.1. Identity

3.1.5.1.2. Personal data

3.1.5.1.3. Virtual currency

3.1.5.2. Information

3.1.5.2.1. Services

3.1.5.2.2. Business processes

3.1.5.2.3. Financial information

3.1.5.2.4. Intellectual Property

3.1.5.2.5. Domain, website, software

3.1.5.3. Facilities

3.1.5.3.1. CII

3.1.5.3.2. Electricity

3.1.5.4. Technology

3.1.5.4.1. Data hosting

3.1.5.4.2. Cloud services

3.1.5.5. Stakeholders

3.1.5.5.1. Interests

3.1.5.5.2. Dependencies

3.1.5.5.3. Supply chains

3.2. Personal

3.2.1. Threats

3.2.1.1. Leakage or theft of personal information

3.2.1.2. Zombie or bot

3.2.1.3. Fraud

3.2.1.4. Bullying

3.2.2. Vulnerabilities

3.2.2.1. Information

3.2.2.2. Vulnerabilities in ICT

3.2.3. Controls

3.2.3.1. Technical

3.2.3.1.1. Firewall

3.2.3.1.2. Antivirus

3.2.3.2. Organizational

3.2.3.2.1. Awareness

3.2.3.2.2. ISPs

3.2.4. Physical

3.2.4.1. People

3.2.4.1.1. Human

3.2.4.2. Facilities

3.2.4.2.1. Home

3.2.4.3. Technology

3.2.4.3.1. Devices

3.2.5. Virtual

3.2.5.1. Online identity

3.2.5.1.1. Avatars

3.2.5.2. Online credit information

3.2.5.3. References in virtual worlds

3.2.5.4. Virtual currency