Data-centric Security

Beschreibung

Mind map of encryption scenarios
Michael Mihalik
Mindmap von Michael Mihalik, aktualisiert more than 1 year ago
Michael Mihalik
Erstellt von Michael Mihalik vor mehr als 7 Jahre
22
0

Zusammenfassung der Ressource

Data-centric Security
  1. Discovery
    1. Classification
      1. Unstructured
        1. Users
          1. Non-Public
            1. Encryption
              1. Data in Motion
                1. Data at Rest
                  1. Key Management
                  2. Access Controls
                    1. Identity Management
                      1. Entitlements
                        1. Entitlement Reviews
                          1. Least Privilege
                            1. Need to Know
                            2. Log Management
                              1. Auditing
                              2. Privileged Users
                            3. Data Loss Prevention
                              1. Removable Media
                                1. Personal Email
                                  1. Email
                                    1. Instant Messaging
                                      1. Social Media
                                        1. Cloud Storage
                                          1. File Transfer Protocols
                                            1. Log Management
                                              1. Auditing
                                            2. Masking
                                              1. Data in Use
                                              2. Log Management
                                                1. Auditing
                                              3. Policies & Procedures
                                                1. Awareness Training
                                                  1. Notifications
                                                    1. Passwords
                                                2. Structured
                                                  1. Applications
                                                    1. Non-Public
                                                      1. Encryption
                                                        1. Data In Motion
                                                          1. Data In Use
                                                            1. Key Management
                                                              1. Data in Transit
                                                              2. Privileged Users
                                                                1. Data at Rest
                                                                  1. Data Loss Prevention
                                                                    1. Email
                                                                      1. Personal Email
                                                                        1. Instant Messaging
                                                                          1. Social Media
                                                                            1. Cloud Storage
                                                                              1. File Transfer Protocols
                                                                                1. Log Management
                                                                                  1. Auditing
                                                                              2. Policies & Procedures
                                                                                1. Awareness Training
                                                                                  1. Provisioning
                                                                                    1. Passwords
                                                                                      1. Session Recording
                                                                                      2. Separation of Duties
                                                                                    2. Vulnerability Testing
                                                                                      1. Patch Management
                                                                                2. Risk Assessment
                                                                                  Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                                                  ähnlicher Inhalt

                                                                                  CCNA Security 210-260 IINS - Exam 3
                                                                                  Mike M
                                                                                  CCNA Security Final Exam
                                                                                  Maikel Degrande
                                                                                  Spyware
                                                                                  Sam2
                                                                                  Professional, Legal, and Ethical Issues in Information Security
                                                                                  mfundo.falteni
                                                                                  CyberSecurity
                                                                                  Stephen Williamson
                                                                                  Security Policies
                                                                                  indysingh7285
                                                                                  McAfee Advance Threat Defense - Training Quiz
                                                                                  esnlalan
                                                                                  Computer Security
                                                                                  Mr A Esch
                                                                                  Cisco IT Essentials 7.0 | Chapter 13: Security Exam
                                                                                  dksajpigbdu asdfagdsga
                                                                                  FIT3031 - Network Security Exam Practice
                                                                                  Nicholas Bagnall
                                                                                  The Vulnerability–Threat–Control Paradigm
                                                                                  Steve Ramirez