CHAPTER 1 INTRODUCTION TO INFORMATION SECURITY

Kom i gang. Det er Gratis
eller tilmeld med din email adresse
CHAPTER 1 INTRODUCTION TO INFORMATION SECURITY af Mind Map: CHAPTER 1 INTRODUCTION TO INFORMATION SECURITY

1. goals of Information Security

1.1. Confidentiality

1.2. Integrity

1.3. Availability

2. Sources of Security Threats

2.1. External

2.2. Internal

2.3. Stuctured

2.4. Unstructured

3. TYPES OF SECURITY ATTACKS

3.1. Reconnaissance attack

3.2. Access attack, Denial of

3.3. Service attack,

3.4. Distributed Denial of Service attack,

3.5. Malicious code attack

4. Types of Social Engineering

4.1. Pretexting

4.2. Phising

4.3. Vishing

5. Tools in information security

5.1. Nmap

5.2. NETSTAT

5.3. Netscan

6. Information Security Definition

7. Areas in Information Security

7.1. Physical Security

7.2. Operational Security

7.3. Management and Policies

8. Security threats

8.1. Malicious code

8.2. Hacking

8.3. Theft

8.4. Natural Disaster

9. Tools in information security

10. ACCESS TO DATA AND EQUIPMENT

10.1. Data Wiping

10.2. Hard Drive Destruction

10.3. Hard Drive Recycling