Cybersecurity

Wowee

Get Started. It's Free
or sign up with your email address
Cybersecurity by Mind Map: Cybersecurity

1. Encryption

1.1. The process of data obfuscation to secure private data.

1.2. Encrypted data and information is

2. Authentication

3. MAC Address Filtering

4. Physical Access

5. Cybersecurity

5.1. Consisting of the processes and practices and technologies designed to protect networks, programs and computers from attack or unauthorised access ;)

5.2. Types of thing

5.2.1. White hat

5.2.1.1. People that are part of an organisation, that do pentests

5.2.2. Grey hat

5.2.2.1. Me.

5.2.3. Black hat

5.2.3.1. Bad people, that do bad things.

6. Firewall

6.1. Can increase small amounts of security

6.2. Helps secure personal and enterprise networks

6.3. Basically fancy User Auths but with the internet

7. Antivirus

7.1. Uses hashes to identify common viruses

7.2. Excellent first line of defence

8. Software Updates

8.1. Keeping software up to date is brilliant for support

8.2. Firmware updates can restrict exploits

8.3. Keep warranty and fixes.

8.4. Somebody to blame problems on.

9. Threats

9.1. Possible Vectors

9.1.1. Malicious Code

9.1.2. Weak and Default Passwords

9.1.3. Misconfigured access rights

9.1.4. Removeable media

9.1.5. Unpatched or outdated software

9.1.6. Social Engineering

9.1.6.1. Human interaction

9.1.6.2. Manipulating people so they give up confidential information

9.1.6.2.1. Like Aaron

9.1.6.3. It's kind of always the victims fault ngl

9.1.6.4. Types

9.1.6.4.1. Phishing and Pharming

9.1.6.4.2. Social Networks

9.1.6.4.3. Blagging (pretexting)

9.1.6.4.4. Shouldering