Cyber Hygiene as a Deterrence Strategy

Laten we beginnen. Het is Gratis
of registreren met je e-mailadres
Cyber Hygiene as a Deterrence Strategy Door Mind Map: Cyber Hygiene as a Deterrence Strategy

1. Policies

1.1. State

1.1.1. Water

1.1.2. K-12

1.1.3. Courts

1.2. Federal

1.2.1. Insurance

1.2.1.1. Backstopping

1.2.2. Defense

1.2.3. Procurement

1.3. Global

1.3.1. Emergencies

1.3.2. Borders

1.4. Organizational

1.4.1. Priviledges

1.4.1.1. Access

1.4.1.2. Trust

1.4.2. Practices

1.4.2.1. Storage

1.4.2.2. Authentication

1.4.2.3. Testing

2. Theories

2.1. Administrative

2.1.1. Structure

2.1.2. Behavior

2.1.2.1. Preventative

2.1.2.2. Reactive

2.1.3. Management

2.2. Governmental

2.2.1. Regulation

2.2.1.1. Efficacy

2.2.2. Politics

2.2.3. Transparency

2.3. Security

2.3.1. Strategies

2.3.1.1. Passive

2.3.1.2. Active

2.3.2. International

2.3.3. Terrorism

2.4. Social Science

2.4.1. Education

2.4.2. Basic Hygiene

3. Industries

3.1. Military

3.1.1. Land

3.1.2. Sea

3.1.3. Air

3.2. Healthcare

3.2.1. HIPAA

3.2.2. Devices

3.2.3. Staff

3.3. Education

3.3.1. K-12

3.3.2. Curriculum

3.3.3. Social Media

4. Behaviors

4.1. Individual

4.1.1. Gender

4.1.2. Age

4.1.3. Profession

4.1.4. Wealth

4.2. Cultural

4.2.1. Collectivism

4.2.2. Freedom

4.2.3. Individualism

4.2.4. Authority

5. Technologies

5.1. Defense

5.1.1. Training

5.1.2. Verification

5.1.3. Software

5.1.4. Encryption

5.2. Danger

5.2.1. Viruses

5.2.2. Hacking

5.2.3. Malware

5.2.4. Phishing