null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
8484132
Informatic security
Description
Mind Map on Informatic security, created by DANIEL VILLADA on 08/04/2017.
Mind Map by
DANIEL VILLADA
, updated more than 1 year ago
More
Less
Created by
DANIEL VILLADA
almost 8 years ago
58
1
0
Resource summary
Informatic security
objectives
Work strategy
Precludes access to private service information
Decrease risk
Requires verification of the applicant's information
Protection of infrastructure
What protects?
Files
Software
Data
Methods
Framework
Tool to support the construction and execution of software
COBIT
domain
Planification and organization
Acquisition
Delivery
Monitoring
User
IT Managers
Managerial
End Users
Auditors
Levels of security
Maturity Model
Indicators of performance
Critical factors of success
Characteristics
Objective control
Directed by measurements
Process Oriented
Business Oriented
Based on Controls
characteristics
Confidentiality
Use of cryptology
Authentication
User verification
I do not repudiate
Message denied
integrity
Adulterated message
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
C1
alex_davidson98
C1 - Formulae to learn
Tech Wilkinson
World at Risk: Disaster hotspots - the Philippines
Holly Lovering
History - Medicine through Time
Alice Love
A-level Maths: Key Differention Formulae
humayun.rana
Python Quiz
karljmurphy
A2 Philosophy and Ethics: Ethical Theory
Adam Cook
Jane Eyre
sennahlee
GCSE Chemistry C4 (OCR)
Usman Rauf
Othello Quotes
georgia2201
The Circulatory System
mimtasin afra
Browse Library