Securing Information Systems

Mindmap Chapter 8

登録は簡単!. 無料です
または 登録 あなたのEメールアドレスで登録
Securing Information Systems により Mind Map: Securing Information Systems

1. Components of an organizational framework for security and control

1.1. Information systems controls

1.1.1. Risk Assessment

1.2. Security Policy

1.2.1. Disaster Recovery Planning and Business Continuity Planning

1.2.2. Role of Auditing

2. Most Important Tools and Technologies for Safeguarding Information Resource

2.1. Identify Management and Authentication

2.1.1. Firewalls, Intrusion Detection Systems, and Antivirus Software

2.1.2. Securing Wireless Networks

2.1.3. Encryption and Public Key Infrastructure

2.1.4. Ensure system availability

2.1.5. Security Issues for Cloud Computing and Mobile Digital Platforms

2.1.6. Ensure Software Quality

3. Information systems vulnerable to destruction, error, and abuse

3.1. Why vulnerable?

3.2. Malicious software

3.3. Hackers and Computer Crime

3.4. Internal Threats

3.5. Software Vulnerabilities

4. Business Value of Security and Control

4.1. Legal and Regulatory Requirements for ERM

4.2. Electronic Evidence and Computer Forensics