Big6 (Computer Security)

Solve your problems or get new ideas with basic brainstorming

Get Started. It's Free
or sign up with your email address
Big6 (Computer Security) by Mind Map: Big6 (Computer Security)

1. Task Definition

1.1. Define the Problem

1.1.1. Define computer security

1.2. Identify the information needed to complete the task

2. Information Seeking Strategies

2.1. Determine the range of possible sources (brainstorm)

2.2. Evaluate the different possible sources to determine priorities (Select the best resources)

2.2.1. Briefly explain the difference threats to computer security:

2.2.1.1. Malicious Code

2.2.1.2. Hacking

2.2.1.3. Natural Disasters

2.2.1.4. Information Theft

3. Location and Access

3.1. Locate resources

3.1.1. Choosing appropriate security measures to overcome computer threats identified

3.2. Find information within sources

4. Use of Information

4.1. Read, view information - decide which parts you want to use (and leave out)

4.1.1. Using the correct procedure

4.1.1.1. Antivirus

4.1.1.2. Anti-Malware

4.1.1.3. Cryptography

4.1.1.4. Firewall

4.1.1.5. Data Backup

4.1.1.6. Human Aspect Awareness

4.2. Extract relevant information from a source

5. Synthesis

5.1. Organize information from multiple resources

5.2. Present the information

6. Evaluation

6.1. Judge the product (effectiveness)

6.2. Judge the information problem-solving process