Information and security mangment

Get Started. It's Free
or sign up with your email address
Information and security mangment by Mind Map: Information and security mangment

1. Security Technologies

1.1. Cryptographic

1.1.1. Assets of system

1.1.1.1. Vulnerabilities

1.1.1.2. Threats

1.1.1.3. Attacks

1.2. User Authentication

1.2.1. Identification step

1.2.2. verification step

1.2.3. Password - Based Authentication

1.2.3.1. Hashed passwords

1.2.3.2. Password Vulnerabilities

1.2.3.3. Password Cracking

1.2.3.4. Modern Approaches

1.2.3.5. Password File Access Control

1.2.3.6. Password Selection Strategies

1.2.4. Token-Based Authentication

1.2.4.1. Memory Cards

1.2.4.2. Smart toke

1.2.5. Bio metric Authentication

1.2.6. Security issues for user authentication

1.3. Access Control

1.3.1. Discretionary Access Control

1.3.2. Role-based Access Control

1.3.3. Attribute- based access Control

2. Security Management

2.1. Risk management

2.2. Risk Assessment Approaches

2.2.1. Security Risk Assessment

2.2.1.1. Baseline Approach

2.2.1.2. Informal Approach

2.2.1.3. Combined Approach

2.3. security control

2.4. security plan

2.5. security plan implementation

2.6. security compliance

2.7. Change and configuration management

3. Security Domains

3.1. Software Security

3.1.1. Quality and reliability

3.1.2. Handling program input

3.1.3. Validating input syntax

3.1.4. Writing safe program code

3.1.5. Operating system interaction

3.2. Web Security

3.3. Operating System Security