null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
34098520
SEGURIDAD INFORMATICA
Description
EYLIN_KARIME_SALAZAR_HINESTROZA
No tags specified
use descriptive tags to organise your content
eylin_karime_salazar_hinestroza
Mind Map by
karime salazar
, updated more than 1 year ago
More
Less
Created by
karime salazar
about 3 years ago
2
0
0
Resource summary
SEGURIDAD INFORMATICA
TIPOS
SEGURIDAD DE RED
PROTECCION
RED
SEGURIDAD DE SOFTWARE
PROTECCION
PROGRAMAS
APLICACIONES
SEGURIDAD DE HARDWARE
FIREWALLS
AMENAZAS
RANSOMWARE
PETYA
WANNACRY
VIRUS
OCULTO EN SOFTWARE
SPAM
CORREO NO DESEADO
PHISHING
MENSAJES FALSOS
GUSANO INFORMATICO
SE PROPAGA
PHARMING
SITIO WEB MALICIOSO
SPYWARE
CABALLO DE TROYA
Media attachments
3 (binary/octet-stream)
4 (binary/octet-stream)
5 (binary/octet-stream)
6 (binary/octet-stream)
1 (binary/octet-stream)
Portada Phishing (binary/octet-stream)
Pharming (binary/octet-stream)
Spam (binary/octet-stream)
Virus (binary/octet-stream)
Spyware (binary/octet-stream)
Petya (binary/octet-stream)
Wannacry (binary/octet-stream)
Gusano (binary/octet-stream)
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Mapas mentales con ExamTime
Nazareth Olivo
Esquemas
Ximena Barrera
fichas de estudio
Guadalupe Reyes Soriano
uy69
读与写/读写 读与写/读写
Music and its most prominent types
Elina Sandoval
Vertebrate animals
Eliana Sandoval
Biochimie 101-120
Rodion Stoev
Bulbul rahidian, puntea, cerebelul – conformație externă, structură
T Adela
Tejidos básicos
Andrea Celedón
INTERPRETAR FUNCIONES Y ECUACIONES APLICADAS A LA ADMINISTRACIÓN
Danny Aguilar
Procesele de adaptare si compensare 1-27
Yanosh Yanosh
Browse Library