Cyber Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Cyber Security by Mind Map: Cyber Security

1. Application security

1.1. Anti Virus software

2. Cyber warfare

2.1. US vs. China

2.2. Operational security

3. Cryptography

3.1. Enigma machine

3.2. Alan Turing

4. Ethical Hacking

4.1. Penetration testing

5. Network Security

5.1. Wireless security

5.2. Programming

5.3. Firewall

6. Mobile Devices

6.1. Android

6.1.1. Harmony OS

6.2. iOS

6.3. Chrome OS

7. Cryptocurrency

7.1. Bitcoin

7.2. Ethereum

8. Dark web

8.1. Tor web browser

8.2. Illegal activities

9. Cyber Attacks

9.1. Hacking

9.2. Malware

9.2.1. ransomware

9.3. phising

9.4. IoT vulnerabilities

9.5. DDOS

10. The CIA of security

10.1. Password manager

10.2. Strong password requirements

10.2.1. A-Z,a-z,0-9, Special Characters

10.3. 2-step authorization

10.3.1. RSA chips

10.3.2. BankID

10.3.3. Biometric ID

10.3.4. RSA Apps

10.4. Data Backup

10.4.1. RAID

10.5. Encryption technology

10.5.1. Soft Tokens

10.5.2. Key fobs

10.5.3. Security tokens