NETWORK SECURITY

Descripción

Mapa Mental sobre NETWORK SECURITY, creado por natsume_aina el 17/01/2016.
natsume_aina
Mapa Mental por natsume_aina, actualizado hace más de 1 año
natsume_aina
Creado por natsume_aina hace más de 8 años
10
1

Resumen del Recurso

NETWORK SECURITY
  1. Network Characteristic
    1. Anonymity
      1. Automation
        1. Distance
          1. Opaqueness
            1. Routing Diversity
            2. What makes Network Vulnerable?
              1. Anonymity
                1. Many Points of Attack
                  1. Sharing
                    1. Complexity of System
                      1. Unknown Perimeter
                        1. Unknown Path
                        2. Components of An Attack
                          1. Method
                            1. Oppurtinity
                              1. Motive
                                1. Challenge
                                  1. Fame
                                    1. Money and Espionage
                                      1. Ideology
                                    2. Threat Precursors
                                      1. Port Scan
                                        1. Social Engineering
                                          1. Reconnaissance
                                            1. Bulletin Boards and Charts
                                            2. Threats
                                              1. Wiretapping
                                                1. Cable
                                                  1. Microwave
                                                  2. Spoofing
                                                    1. Masquerade
                                                      1. Session Hijacking
                                                        1. Man-in-the-Middle Attack
                                                        2. Message Confidentiality
                                                          1. Misdelivery
                                                            1. Exposure
                                                              1. Traffic Flow Analysis
                                                              2. Message Integirty Threats
                                                                1. Falsification of Messages
                                                                  1. Noise (Unintentional interference)
                                                                  2. Website Defacement
                                                                    1. Buffer Overflows
                                                                      1. Dot-dot Address problems
                                                                        1. Application Code Errors
                                                                          1. Server Side Include
                                                                          2. Denial of Service (DOS)
                                                                            1. Transmission Failure
                                                                              1. Connection Flooding
                                                                                1. Syn Flood
                                                                                  1. Traffic Redirection
                                                                                    1. DNS Attacks
                                                                                    2. Distributed DOS( DDOS)
                                                                                      1. Threats to Active and Mobile Code
                                                                                        1. Cookies
                                                                                          1. Scripts
                                                                                            1. Active Code
                                                                                          2. Network Security Control
                                                                                            1. Architecture
                                                                                              1. Segmentation
                                                                                                1. Redundancy
                                                                                                  1. Single Point of Failure
                                                                                                  2. Encryption
                                                                                                    1. Link Encryption
                                                                                                      1. End-to-end Encryption
                                                                                                      2. Strong Authentication
                                                                                                        1. One-time password
                                                                                                          1. Challenge-response systems
                                                                                                            1. Kerberos
                                                                                                            2. Access Control
                                                                                                              1. Router and Firewall
                                                                                                                1. Intrusion Detection System
                                                                                                                2. Alarms and Alerts
                                                                                                                  1. Honeypots
                                                                                                                    1. Traffic Flow Security
                                                                                                                    Mostrar resumen completo Ocultar resumen completo

                                                                                                                    Similar

                                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                                    Mike M
                                                                                                                    CCNA Security 210-260 IINS - Exam 2
                                                                                                                    Mike M
                                                                                                                    SY0-401 Part 1 (50 questions)
                                                                                                                    desideri
                                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                                    Ricardo Nuñez
                                                                                                                    CCNA Security 210-260 IINS - Exam 3
                                                                                                                    irvin pastora
                                                                                                                    1.3 Network and Security Components
                                                                                                                    DJ Perrone
                                                                                                                    U1. OSI 7 Layer Reference Model
                                                                                                                    Craig Parker
                                                                                                                    Types of Attacks
                                                                                                                    River L.
                                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                                    irvin pastora
                                                                                                                    Network Security Vocabulary
                                                                                                                    Shantal K Green
                                                                                                                    Maximizing Efficiency: A Comprehensive Guide to Cloud Services for Your Business
                                                                                                                    Andrew James