Get Started. It's Free
or sign up with your email address
SIT 182 by Mind Map: SIT 182

1. computer security

1.1. Software-based firewall VS hardware-based firewall

1.2. week 5

1.2.1. remote host attacks and defenses

1.2.1.1. DOS

1.2.1.1.1. Notorious ping of death attack

1.2.1.2. SSH

1.2.1.2.1. defense for SSH

1.3. week 6

1.3.1. Malware application attacks and defenses

1.3.1.1. Malware

1.3.1.1.1. circulation/ inflection

1.3.1.1.2. Concealment

1.3.1.1.3. Payload capabilities

1.3.2. defenses

1.3.2.1. Managing patches

1.3.2.2. Configuring personal firewall

1.3.2.3. Installing anti-malware softwares

1.3.2.4. Monitoring User Account Control(UAC)

1.3.2.5. Creating data backups

1.3.2.6. knowing how to recover from attacks

2. Privacy

2.1. week 9

2.1.1. Privacy protection

2.1.1.1. Cryptography

2.1.1.1.1. confidentiality

2.1.1.1.2. Integrity

2.1.1.1.3. Availability

2.1.1.1.4. Authentication

2.1.1.1.5. Non-repudiation

2.1.1.1.6. REMINDER

2.1.1.2. Following best practices

2.1.1.3. Organizations takes responsibility

2.1.2. ciphers

2.1.2.1. Shift

2.1.2.2. substitution

2.1.2.3. transposition

2.1.2.4. affine

2.1.2.5. vigenere

2.1.3. Importance of key size

2.2. week 10

2.2.1. digital signature

2.2.1.1. privacy best practices

3. ATTACKS

3.1. defenses

3.1.1. Strong password

3.1.2. Recognizing phishing email

3.1.3. taking steps to avoid identity theft

3.1.4. secure social networking sites

4. personal security

4.1. Week 3

4.1.1. Brute force attack

4.1.2. Dictionary attack

4.2. week 4

4.2.1. Social engineering attack

4.2.2. Identity theft

4.2.2.1. phishing

4.2.2.2. typo squatting

4.2.2.3. Pretexting

4.2.2.4. Hoaxes

4.2.2.5. Dumpster diving

4.2.2.6. Shoulder surfing

4.2.3. Social networking risks

5. Internet security

5.1. week 7

5.1.1. SQL injection attack & defenses

5.1.2. XSS attack & defenses

5.2. week 8

5.2.1. directory traversal attack

5.2.2. Email

5.2.2.1. IMAP

5.2.2.2. POP

5.2.3. Internet Security Risks

5.2.3.1. Browser vulnerabilities

5.2.3.1.1. Extensions

5.2.3.1.2. plug-in

5.2.3.1.3. add-on

5.2.3.2. Malvertising

5.2.3.3. Drive-by-downloads

5.2.3.4. cookies

5.2.3.4.1. first party

5.2.3.4.2. third party

5.2.3.5. Email risk

5.2.4. defenses

5.2.4.1. Securing web browsers

5.2.4.2. Maintaining Email defenses

5.2.4.3. following internet security best practices

6. Mobile security

6.1. week 11

6.1.1. defenses

6.1.2. Mobile devices

6.1.2.1. Laptop

6.1.2.2. phone

6.1.2.3. iPad

6.1.3. Mobile networks

6.1.3.1. WiFi

6.1.3.1.1. attacks

6.1.3.2. Bluetooth

6.1.3.2.1. attacks

6.1.4. Questions

6.1.4.1. Secure public WiFi network

6.1.4.2. Secure home WiFi network

6.1.4.3. secure mobile devices