Security and Control of Information Systems

Get Started. It's Free
or sign up with your email address
Rocket clouds
Security and Control of Information Systems by Mind Map: Security and Control of Information Systems

1. Vulnerability

1.1. hardware

1.1.1. configuration errors

1.1.2. damage

1.1.3. brakedowns

1.2. sofware

1.2.1. pragramming errors

1.2.2. instalation errors

1.2.3. unauthorize changes

1.3. Disasters

1.3.1. power failures

1.3.2. flods

1.3.3. fire

1.4. Violation of information

2. Value

2.1. Loss revenue

2.2. Lowered market value

2.3. Lowered employee productivity

2.4. Higher operational cost

2.5. Legal responsability

2.6. Electronic evidence

2.7. Computers forensics

3. Framework

3.1. Risk assesment

3.1.1. types of threats

3.1.2. probability of occurrence

3.1.3. potencial loss

3.2. Controls

3.2.1. general

3.2.1.1. software

3.2.1.2. hardware

3.2.1.3. operations

3.2.1.4. administrative

3.2.2. applicants

3.2.2.1. input controls

3.2.2.2. processing controls

3.2.2.3. output controls

3.3. Security policy

3.4. Audit

4. Technology and tools

4.1. Access control

4.2. Firewall

4.3. Antivirus

4.4. Antispyware

4.5. Encryption

4.6. Digital certificate

4.7. Ensuring system availability

4.8. Digital certificates

4.9. Recovery-orintated computing

5. Abuse

5.1. Internet

5.1.1. open to anyone

5.1.2. hackers

5.1.3. trade secrets

5.1.4. IM messages

5.2. Employees

5.2.1. knowledge

5.2.2. procedures

5.2.3. social engineering