Visualizing Network Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Visualizing Network Security by Mind Map: Visualizing Network Security

1. Firewall Purposes

1.1. Controls what traffic is allowed to traverse from one side to the other

1.2. Will protect your computer from outside attempts to control or gain access your computer

2. Firewalls

2.1. Software

2.1.1. A collection of data or computer instructions that tell the computer how to work

2.1.2. Internal

2.2. Hardware

2.2.1. Physical elements of a computer

2.2.2. Physical

3. DoS Attack

3.1. Denial-Of-Service

3.2. A cyber-attack attack meant to shut down a machine or network, making it inaccessible to its intended users

4. Trojan Horse

4.1. Any malware which misleads users of its true intent

4.2. Example: a program that claims to rid your computer of viruses but instead introduces viruses onto your computer

5. Malicious use of Internet

5.1. Cyberterroism

5.1.1. The use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.

5.2. Cyberstalking

5.2.1. Use of the Internet or other electronic means to stalk or harass an individual, group, or organization