null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
4211086
Stuxnet Worm
Description
6086
No tags specified
chava.hariprasad2014@gmail.com
chava.hariprasad2012@gmail.com
rathod.geetanjali@ymail.com
Mind Map by
Chava Hariprasad
, updated more than 1 year ago
More
Less
Created by
Chava Hariprasad
over 8 years ago
5
0
0
Resource summary
Stuxnet Worm
Recovery
Incident procedures
Network/system isolation
Backups
Disciplinary and legal action
Detection
Antivirus software
Network and systems monitoring
Intrusion Detection Systems
Alert staff
Prevention
Antivirus software
Perimeter controls
Policies, standards, guidelines
Procedures with awareness and compliance
Threats
Malicious programmers
Disgruntled employees
Hackers/crackers
Industrial spies
Organized criminals
Terrorists,hacktivists
Nation states
Vulnerabilities
Network communications
Data sharing
Trusted/ privileged insiders
Impacts
Unauthorized disclosure
Unauthorized modification
Unauthorized destruction or Denial of service
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Causes of the Cold War Quiz
Fro Ninja
Transforming Graphs
james_hobson
CHEMISTRY C1 7
x_clairey_x
Maths C4 Trig formulae (OCR MEI)
Zacchaeus Snape
Symbols in Lord of the Flies
lowri_luxton
Calculus I
GraceEChem
Unit 3 Business Studies
Lauren Thrower
GCSE REVISION TIMETABLE
rebekahanne11
Macbeth Essay Notes
Mel M
Forces and motion
Catarina Borges
Preparing for ACT Math section
Don Ferris
Browse Library