Get Started. It's Free
or sign up with your email address
Rocket clouds
SIT 182 by Mind Map: SIT 182

1. ATTACKS

1.1. defenses

1.1.1. Strong password

1.1.2. Recognizing phishing email

1.1.3. taking steps to avoid identity theft

1.1.4. secure social networking sites

2. personal security

2.1. Week 3

2.1.1. Brute force attack

2.1.2. Dictionary attack

2.2. week 4

2.2.1. Social engineering attack

2.2.2. Identity theft

2.2.2.1. phishing

2.2.2.2. typo squatting

2.2.2.3. Pretexting

2.2.2.4. Hoaxes

2.2.2.5. Dumpster diving

2.2.2.6. Shoulder surfing

2.2.3. Social networking risks

3. computer security

3.1. Software-based firewall VS hardware-based firewall

3.2. week 5

3.2.1. remote host attacks and defenses

3.2.1.1. DOS

3.2.1.1.1. Notorious ping of death attack

3.2.1.2. SSH

3.2.1.2.1. defense for SSH

3.3. week 6

3.3.1. Malware application attacks and defenses

3.3.1.1. Malware

3.3.1.1.1. circulation/ inflection

3.3.1.1.2. Concealment

3.3.1.1.3. Payload capabilities

3.3.2. defenses

3.3.2.1. Managing patches

3.3.2.2. Configuring personal firewall

3.3.2.3. Installing anti-malware softwares

3.3.2.4. Monitoring User Account Control(UAC)

3.3.2.5. Creating data backups

3.3.2.6. knowing how to recover from attacks

4. Internet security

4.1. week 7

4.1.1. SQL injection attack & defenses

4.1.2. XSS attack & defenses

4.2. week 8

4.2.1. directory traversal attack

4.2.2. Email

4.2.2.1. IMAP

4.2.2.2. POP

4.2.3. Internet Security Risks

4.2.3.1. Browser vulnerabilities

4.2.3.1.1. Extensions

4.2.3.1.2. plug-in

4.2.3.1.3. add-on

4.2.3.2. Malvertising

4.2.3.3. Drive-by-downloads

4.2.3.4. cookies

4.2.3.4.1. first party

4.2.3.4.2. third party

4.2.3.5. Email risk

4.2.4. defenses

4.2.4.1. Securing web browsers

4.2.4.2. Maintaining Email defenses

4.2.4.3. following internet security best practices

5. Privacy

5.1. week 9

5.1.1. Privacy protection

5.1.1.1. Cryptography

5.1.1.1.1. confidentiality

5.1.1.1.2. Integrity

5.1.1.1.3. Availability

5.1.1.1.4. Authentication

5.1.1.1.5. Non-repudiation

5.1.1.1.6. REMINDER

5.1.1.2. Following best practices

5.1.1.3. Organizations takes responsibility

5.1.2. ciphers

5.1.2.1. Shift

5.1.2.2. substitution

5.1.2.3. transposition

5.1.2.4. affine

5.1.2.5. vigenere

5.1.3. Importance of key size

5.2. week 10

5.2.1. digital signature

5.2.1.1. privacy best practices

6. Mobile security

6.1. week 11

6.1.1. defenses

6.1.2. Mobile devices

6.1.2.1. Laptop

6.1.2.2. phone

6.1.2.3. iPad

6.1.3. Mobile networks

6.1.3.1. WiFi

6.1.3.1.1. attacks

6.1.3.2. Bluetooth

6.1.3.2.1. attacks

6.1.4. Questions

6.1.4.1. Secure public WiFi network

6.1.4.2. Secure home WiFi network

6.1.4.3. secure mobile devices