Information Security

Information Security Course Uni Oulu MindMap

Get Started. It's Free
or sign up with your email address
Information Security by Mind Map: Information Security

1. Principles of the CIA Triad

1.1. Confidentiality

1.1.1. -Encryption (AES, RSA, SSL/TLS) -Access Controls (RBAC, DAC, MAC) -Data Classification -Steganography

1.2. Integrity

1.2.1. -Hashing (SHA-256, MD5) -Digital Signatures -Data Consistency Checks -File Integrity Monitoring

1.3. Availability

1.3.1. -Redundancy (RAID, Backups) -Disaster Recovery Plans (DRP) -DDoS Mitigation -Business Continuity Planning (BCP)

2. Security Measures and Controls

2.1. Administrative Controls

2.1.1. -Security Policies -Risk Assessments -Security Awareness Training

2.2. Technical Controls

2.2.1. -Firewalls -Intrusion Detection Systems (IDS/IPS) -Anti-malware Solutions -Multi-Factor Authentication (MFA)

2.3. Physical Controls

2.3.1. -Surveillance Cameras -Biometrics -Secure Facilities

3. Threats and Attacks

3.1. Types of Threats

3.1.1. -Malware (Viruses, Trojans, Ransomware) -Phishing and Social Engineering -Denial of Service (DoS/DDoS) Zero-Day Vulnerabilities

3.2. Threat Actors

3.2.1. -Hackers (Black Hat, White Hat) -Insider Threats -Nation-State Actors Malicious Novice Hackers

3.3. Mitigation Techniques

3.3.1. -Penetration Testing -Incident Response -Threat Intelligence

4. Governance, Compliance and Framework

4.1. Legal and Regulatory Compliance

4.1.1. -GDPR (General Data Protection Regulation) -HIPAA (Health Information Privacy) -PCI-DSS (Payment Security)

4.2. Security Frameworks

4.2.1. -ISO -NIST Cybersecurity Framework -COBIT (Control Objectives for Information Technology)

4.3. Best Practices

4.3.1. -Least Privilege Principle -Zero Trust Architecture -Security by Design