Get Started. It's Free
or sign up with your email address
Cyber Security by Mind Map: Cyber Security

1. Ethical Hacking

1.1. Penetration testing

2. Network Security

2.1. Wireless security

2.2. Programming

2.3. Firewall

3. Dark web

3.1. Tor web browser

3.2. Illegal activities

4. Cyber Attacks

4.1. Hacking

4.2. Malware

4.2.1. ransomware

4.3. phising

4.4. IoT vulnerabilities

4.5. DDOS

5. The CIA of security

5.1. Password manager

5.2. Strong password requirements

5.2.1. A-Z,a-z,0-9, Special Characters

5.3. 2-step authorization

5.3.1. RSA chips

5.3.2. BankID

5.3.3. Biometric ID

5.3.4. RSA Apps

5.4. Data Backup

5.4.1. RAID

5.5. Encryption technology

5.5.1. Soft Tokens

5.5.2. Key fobs

5.5.3. Security tokens

6. Application security

6.1. Anti Virus software

7. Cyber warfare

7.1. US vs. China

7.2. Operational security

8. Cryptography

8.1. Enigma machine

8.2. Alan Turing

9. Mobile Devices

9.1. Android

9.1.1. Harmony OS

9.2. iOS

9.3. Chrome OS

10. Cryptocurrency

10.1. Bitcoin

10.2. Ethereum