null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
924179
Computer Security
Description
BSIP (ECIH) Mind Map on Computer Security, created by azamuddin on 24/05/2014.
No tags specified
bsip
ecih
Mind Map by
azamuddin
, updated more than 1 year ago
More
Less
Created by
azamuddin
over 10 years ago
252
1
0
Resource summary
Computer Security
A.2 Operational Categories
Prevention
create information security policy
User Training
Access Control
Firewall
Detection
Whistle Blower
Intrusion Detection System
Integrity Assurance Software
Respond
unpluggin Network Cable
Blocking IP Address
Recovery
Disk Mirorring
Automated Backup
A.1 Computer Security Incident
A.1.1 Characteristic
The Attacker or Origin
Tools Used
Vulnerability Exploited
Action Performed
Intended Target
Unauthorized Result
Attack Objectives
A.1.3 CSIRT
Why Need? Benefit?
Economic
Public Relation
Legal
Goal & Objective
Activities
Non Real Time
Pre Incident
Charter
Mission Statement
types of incidents - A.1.2
service provided
constituenty
Authority & Funding
Policy
Incident Reporting Procedures
PoC
Various Contact types
Team members
Work hours
Time Zone
Who report?
Incident Symptom awareness
Incident Tracking & Handling Procedure
Post Incident
Real Time
Incident Handling
Identify Incident
determine actual incident
verify, security or non-security?
Incident Prioritization
Containtment
Eradicate
Incident Recovery
Identify Damage
Repair System
Restore System
Investigation
Identify Cause
Forensic
Collect Evidence
Volatile
Non Volatile
Assign Blame
reoccurrence prevvention
Restitution
Communication
A.1.2 Types and Categories of CSI
Service Interrupts
System Interferrence
Unauthorized Access
Commercial use
Malicious Communication
Theft
Unsolicitated Bulk Mail
Other
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
SSCP Domains
Abdul Issa
Computer Security Potential Flaws
Rob Speirs
Risk Assessment
azamuddin
Reducing the Impact of Earthquakes
siobhan.quirk
Geometry Formulas
Selam H
The Heart
annalieharrison
Cold War Timeline
jacksearle
Ebola Virus Disease
rubyduggan
Biology - the digestive system
Oliviax
Factores Humanos en la Aviación
Adriana Forero
Browse Library