CHAPTER 1 INTRODUCTION TO INFORMATION SECURITY

Laten we beginnen. Het is Gratis
of registreren met je e-mailadres
CHAPTER 1 INTRODUCTION TO INFORMATION SECURITY Door Mind Map: CHAPTER 1 INTRODUCTION TO INFORMATION SECURITY

1. goals of Information Security

1.1. Confidentiality

1.2. Integrity

1.3. Availability

2. Sources of Security Threats

2.1. External

2.2. Internal

2.3. Stuctured

2.4. Unstructured

3. TYPES OF SECURITY ATTACKS

3.1. Reconnaissance attack

3.2. Access attack, Denial of

3.3. Service attack,

3.4. Distributed Denial of Service attack,

3.5. Malicious code attack

4. Types of Social Engineering

4.1. Pretexting

4.2. Phising

4.3. Vishing

5. Tools in information security

5.1. Nmap

5.2. NETSTAT

5.3. Netscan

6. Information Security Definition

7. Areas in Information Security

7.1. Physical Security

7.2. Operational Security

7.3. Management and Policies

8. Security threats

8.1. Malicious code

8.2. Hacking

8.3. Theft

8.4. Natural Disaster

9. Tools in information security

10. ACCESS TO DATA AND EQUIPMENT

10.1. Data Wiping

10.2. Hard Drive Destruction

10.3. Hard Drive Recycling