Get Started. It's Free
or sign up with your email address
Security by Mind Map: Security

1. 3. Risk Management

1.1. Information Risk Management (IRM)

1.2. Type of Risk to IT

1.2.1. Physical darmage

1.2.2. Human interaction

1.2.3. Equipment malfunction

1.2.4. Inside and Outside attacks

1.2.5. Misuse of data

1.2.6. Loss of Data

1.2.7. Application error

1.3. Information Risk Management Plan

1.4. IRM Policy

1.5. IRM Policy Components

1.6. IRM Team's Goal

1.7. Key that make the goal accomplished

1.8. Risk Analysis

1.8.1. Risk Analysis Process Steps of Risk Analysis Assign Value to Assets Estimate Potential Loss per Threat Perform a threat Analysis Derive the Overall Loss Potential per Threat Management Risks

1.8.2. Risk Analysis Methodology Quantitative Risk Analysis Qualitative Risk Analysis

1.8.3. Results of Risk Analysis

2. 2. Authentications

2.1. Authentication Basics

2.1.1. Authentication Process

2.2. Passwords

2.2.1. Password guessing Dictionary attack Random selection of password

2.2.2. Password aging

2.2.3. One-time password

2.3. Biometrics

2.3.1. Fingerprints

2.3.2. Voices

2.3.3. Eyes

2.3.4. Faces

2.3.5. Keystrokes

2.3.6. Combinations

2.4. Multiple methods

3. 1. Security

3.1. Physical Security

3.2. Communication Security

3.3. Computer Security

3.4. Network Security

3.5. Information Security

3.5.1. Security Concepts

3.5.2. security Properties Confidentiality Integrity Availability Consistency Auditability Control Authentication Non-repudiation

3.5.3. Security Methodology Five steps to better security assets risks Protections Tools Priorities

3.5.4. Information Enermies Threat Attack Passive Attacks Active Attacks SYS flood Compromised-Key Attack Sniffer Attack Application-Layer Attack Security Related Terms Vulnerabilities and Exploits Threats