Get Started. It's Free
or sign up with your email address
Security by Mind Map: Security

1. Principles

1.1. Confidentiality

1.2. Integrity

1.3. Availability

1.4. Accountability

2. Physical security

2.1. Environmental monitoring

2.2. Access control

2.3. Surveillance camera systems

2.4. Interconnectivity and processing systems

3. Standard

3.1. ISO27001

4. Product

4.1. Antivirus

4.2. Access controls

4.3. Firewall

4.4. Proxy

4.4.1. WAF

4.5. SIM/SIEM

4.5.1. Commercial

4.5.1.1. RSA enVision

4.5.1.2. ArcSight ESM

4.5.1.3. IBM SiteProtector

4.5.1.4. Cisco MARS

4.5.1.5. eIQnetworks SecureVue

4.5.1.6. Q1 Labs QRadar SIEM

4.5.1.7. NitroSecurity Content-Aware SIEM

4.5.1.8. TriGeo SIM

4.5.1.9. LogMatrix EventCenter

4.5.1.10. Intellitactics SIEM

4.5.1.11. Novell Security Management

4.5.1.12. SenSage SIEM

4.5.1.13. AlienVault Pro

4.5.1.14. Splunk Enterprise

4.5.2. OpenSource

4.5.2.1. AlienVault/OSSIM

4.5.2.2. Splunk Free

4.5.2.3. Prelude

4.6. IDS/IPS

4.6.1. Commercial

4.6.1.1. Tipping Point

4.6.1.2. IBM Proventia

4.6.2. OpenSource

4.6.2.1. Snort

4.6.2.2. Bro

4.6.2.3. OSSEC

4.7. VPN

4.8. Policy management

4.9. Scanner

4.9.1. Network scanning

4.9.1.1. Nmap

4.9.1.2. Ntop

4.9.2. Vulnerability scanning

4.9.2.1. Nessus

4.10. Network analysis Tools

4.10.1. Packet sniffer

4.10.1.1. Wireshark

5. Attacks

5.1. Type

5.1.1. Access

5.1.2. Modification

5.1.3. Denial of service

5.1.4. Repudiation

5.2. Detection

5.2.1. Anomaly based

5.2.2. Signature based

5.2.3. Honeypot

5.2.4. Sandbox

6. Concepts

6.1. Risk

6.2. Vulnerability

6.3. Threat

6.4. Exploit

7. Malware

7.1. Virus

7.2. Trojan

7.3. Worm

8. Certification

8.1. (ISC)2

8.1.1. CISSP

8.1.2. CISSP Concentration

8.1.2.1. ISSAP

8.1.2.2. ISSEP

8.1.2.3. ISSMP

8.1.3. CSSP

8.2. ISACA

8.2.1. CISA

8.2.2. CISM

8.3. SANS

8.3.1. GSEC

8.3.2. GCFW

8.3.3. GCIA

8.3.4. GCIH

8.3.5. GCWN

8.3.6. GCUX

8.3.7. GSE

8.4. ISECOM

8.4.1. OPST

8.4.2. OPSA

8.4.3. OPSE

8.5. AIPSI

8.5.1. LoCSI

8.5.2. LoCSI-PMI

8.6. CompTIA

8.6.1. CompTIA Security+

8.7. Cisco

8.7.1. CCSP

9. Process

9.1. Assesment

9.1.1. Vulnerability assessment

9.1.2. Penetration test

9.1.3. Risk analisys

9.2. Policy

9.2.1. Policy and architecture definition

9.2.2. Management design

9.3. Implementation

9.3.1. System configuration

9.3.2. Hardening

9.4. Audit

9.4.1. Scheduled penetration test

9.4.2. Monitoring