Create your own awesome maps

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account?
Log In

IA by Mind Map: IA
0.0 stars - reviews range from 0 to 5

IA

Supporting Areas

Basic Networking

Wired and Wireless

Telecom and Network Security

Transmission Security

Basic MIS

Core IA Knowledge

Core Knowledge

Definitions, 1, Control, Vulnerability, Threat, Attack

Information States, Storage, Transmission, Processing

Military/Government, OPSEC, INFOSEC, NSTISS Basics, Facets of NSTISS

Threat Detection and Response

Forensics

Forensic Analysis

eDiscovery

Incident Response

Intrusion Investigation

Penetration Testing

Honeypots

IDS

Audit/Accountability

Audits

Logs

Traceability

Threat types/classes

Cover and Deception

HUMINT

Traffic Analysis

Attribution

Vulnerability Controls

Cryptography

PKI

Digital Signatures

Symmetric Encryption

Asymmetric Encryption

Hashes, Message Digest, SHA

Access Control

Authentication and Identification, Capabilities, POSIX, Kerberos, Credentials, Something You Know, Passwords, Something You Have, Smart Cards, Personal Identity Verification (PIV), Something You Are, Biometrics, Access Control List

Authorization, R/W/X, DAC/MAC/RBAC, Mode of Operation

Physical Security, Environmental, Layered Physical Defense and Entry Points, Site Location Principles, Asset Management, Key Management, Physical Keys, Electronics Keys, COMSEC Material, Destruction, Identity and Inventory, Key Management Protocols, Access, Control, Storage

Network, end-to-end access control, class and node privileges

Technical Controls

Firewalls

Media, Remanence, Backups, Object Reuse, Destruction, Emergency Destruction, External Marking, Downgrade and Declassification, Sanitization, Transportation

EMSEC

Transmission Security, Covert Channels (Crosstalk), Dial Back, Directional Signals, Freq Hopping, Jammin, Line of Sight, Line Authentication, Low Power, Msking, Optical Systems, Protected Wireline, Screening, Spread Spectrum Transmission, Burst Transmission

TEMPEST, Banding, Cabling, Filtered Power, Grounding, Shielding, TEMPEST Separation, Zone of Control/Zoning, Attenuation

Risk and Management

Risk

Business Continuity

Disaster Recovery, Response, Recovery, Restoration

System Certification, Accreditation, System Assessment, Systems/Services Acquisition

Contingency Planning

Risk Assessment

Management

Least Privilege

Separation of Duties

Personnel Management, Awareness and Training, Personnel Security

Configuration Management, Software Configuration Management, Computer Hardware Configuration Management

Roles and Responsibilites

Effectiveness of Security Programs

Enforcement

Legal

Major Legal Systems

Common and Civil Law

Government Regulations and Acts, RIAA, DMCA, Copyright, Patents

Computer Crimes

National Policy, NSTISS Policies, AIS Security, Communications Security, Protection of Information, Employee accountability for agency information

Administrative/Procedural

Maybe move to Risk and Managment

Policies, Security Policy/Plan

Procedures

Standards

Guidelines

Ethical

Professionalism

Privacy

Development

Ontologies and Models

MacCumber Model

Defense in Depth

Models (Bell-LaPadula)

CIA AA

Software

Trusted Systems

System Architecture

Applications

Trusted O/S and Computing Base

Development, Change Control Management (CCB), Secure Development, Lifecycle

Network

public vs private

dial-up or dedicated