Unlock the full potential of your projects.
Try MeisterTask for free.
Heb je nog geen account?
Meld je Gratis aan
Browse
Aanbevolen kaarten
Rubrieken
Project management
Zakelijke doelen
Personeelszaken
Brainstormen en analyseren
Marketing & Inhoud
Onderwijs en notities
Entertainment
Leven
Technologie
Ontwerp
Samenvattingen
Andere
Talen
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Andere
Toon volledige map
Kopieer en bewerk map
Kopieer
CHAPTER 1 INTRODUCTION TO INFORMATION SECURITY
Andere
siti sharmila osmin
Volg
Laten we beginnen.
Het is Gratis
Login met Google
of
registreren
met je e-mailadres
Vergelijkbare mind mappen
Overzicht van map
CHAPTER 1 INTRODUCTION TO INFORMATION SECURITY
Door
siti sharmila osmin
1. goals of Information Security
1.1. Confidentiality
1.2. Integrity
1.3. Availability
2. Sources of Security Threats
2.1. External
2.2. Internal
2.3. Stuctured
2.4. Unstructured
3. TYPES OF SECURITY ATTACKS
3.1. Reconnaissance attack
3.2. Access attack, Denial of
3.3. Service attack,
3.4. Distributed Denial of Service attack,
3.5. Malicious code attack
4. Types of Social Engineering
4.1. Pretexting
4.2. Phising
4.3. Vishing
5. Tools in information security
5.1. Nmap
5.2. NETSTAT
5.3. Netscan
6. Information Security Definition
7. Areas in Information Security
7.1. Physical Security
7.2. Operational Security
7.3. Management and Policies
8. Security threats
8.1. Malicious code
8.2. Hacking
8.3. Theft
8.4. Natural Disaster
9. Tools in information security
10. ACCESS TO DATA AND EQUIPMENT
10.1. Data Wiping
10.2. Hard Drive Destruction
10.3. Hard Drive Recycling
Begin. Het is gratis!
Verbind met Google
of
Registreren