NETWORK SECURITY

Description

Mind Map on NETWORK SECURITY, created by natsume_aina on 17/01/2016.
natsume_aina
Mind Map by natsume_aina, updated more than 1 year ago
natsume_aina
Created by natsume_aina almost 9 years ago
10
1

Resource summary

NETWORK SECURITY
  1. Network Characteristic
    1. Anonymity
      1. Automation
        1. Distance
          1. Opaqueness
            1. Routing Diversity
            2. What makes Network Vulnerable?
              1. Anonymity
                1. Many Points of Attack
                  1. Sharing
                    1. Complexity of System
                      1. Unknown Perimeter
                        1. Unknown Path
                        2. Components of An Attack
                          1. Method
                            1. Oppurtinity
                              1. Motive
                                1. Challenge
                                  1. Fame
                                    1. Money and Espionage
                                      1. Ideology
                                    2. Threat Precursors
                                      1. Port Scan
                                        1. Social Engineering
                                          1. Reconnaissance
                                            1. Bulletin Boards and Charts
                                            2. Threats
                                              1. Wiretapping
                                                1. Cable
                                                  1. Microwave
                                                  2. Spoofing
                                                    1. Masquerade
                                                      1. Session Hijacking
                                                        1. Man-in-the-Middle Attack
                                                        2. Message Confidentiality
                                                          1. Misdelivery
                                                            1. Exposure
                                                              1. Traffic Flow Analysis
                                                              2. Message Integirty Threats
                                                                1. Falsification of Messages
                                                                  1. Noise (Unintentional interference)
                                                                  2. Website Defacement
                                                                    1. Buffer Overflows
                                                                      1. Dot-dot Address problems
                                                                        1. Application Code Errors
                                                                          1. Server Side Include
                                                                          2. Denial of Service (DOS)
                                                                            1. Transmission Failure
                                                                              1. Connection Flooding
                                                                                1. Syn Flood
                                                                                  1. Traffic Redirection
                                                                                    1. DNS Attacks
                                                                                    2. Distributed DOS( DDOS)
                                                                                      1. Threats to Active and Mobile Code
                                                                                        1. Cookies
                                                                                          1. Scripts
                                                                                            1. Active Code
                                                                                          2. Network Security Control
                                                                                            1. Architecture
                                                                                              1. Segmentation
                                                                                                1. Redundancy
                                                                                                  1. Single Point of Failure
                                                                                                  2. Encryption
                                                                                                    1. Link Encryption
                                                                                                      1. End-to-end Encryption
                                                                                                      2. Strong Authentication
                                                                                                        1. One-time password
                                                                                                          1. Challenge-response systems
                                                                                                            1. Kerberos
                                                                                                            2. Access Control
                                                                                                              1. Router and Firewall
                                                                                                                1. Intrusion Detection System
                                                                                                                2. Alarms and Alerts
                                                                                                                  1. Honeypots
                                                                                                                    1. Traffic Flow Security
                                                                                                                    Show full summary Hide full summary

                                                                                                                    Similar

                                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                                    Mike M
                                                                                                                    CCNA Security 210-260 IINS - Exam 2
                                                                                                                    Mike M
                                                                                                                    SY0-401 Part 1 (50 questions)
                                                                                                                    desideri
                                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                                    Ricardo Nuñez
                                                                                                                    CCNA Security 210-260 IINS - Exam 3
                                                                                                                    irvin pastora
                                                                                                                    1.3 Network and Security Components
                                                                                                                    DJ Perrone
                                                                                                                    U1. OSI 7 Layer Reference Model
                                                                                                                    Craig Parker
                                                                                                                    Types of Attacks
                                                                                                                    River L.
                                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                                    irvin pastora
                                                                                                                    Network Security Vocabulary
                                                                                                                    Shantal K Green
                                                                                                                    Maximizing Efficiency: A Comprehensive Guide to Cloud Services for Your Business
                                                                                                                    Andrew James