NETWORK SECURITY

Descrição

Mapa Mental sobre NETWORK SECURITY, criado por natsume_aina em 17-01-2016.
natsume_aina
Mapa Mental por natsume_aina, atualizado more than 1 year ago
natsume_aina
Criado por natsume_aina quase 9 anos atrás
10
1

Resumo de Recurso

NETWORK SECURITY
  1. Network Characteristic
    1. Anonymity
      1. Automation
        1. Distance
          1. Opaqueness
            1. Routing Diversity
            2. What makes Network Vulnerable?
              1. Anonymity
                1. Many Points of Attack
                  1. Sharing
                    1. Complexity of System
                      1. Unknown Perimeter
                        1. Unknown Path
                        2. Components of An Attack
                          1. Method
                            1. Oppurtinity
                              1. Motive
                                1. Challenge
                                  1. Fame
                                    1. Money and Espionage
                                      1. Ideology
                                    2. Threat Precursors
                                      1. Port Scan
                                        1. Social Engineering
                                          1. Reconnaissance
                                            1. Bulletin Boards and Charts
                                            2. Threats
                                              1. Wiretapping
                                                1. Cable
                                                  1. Microwave
                                                  2. Spoofing
                                                    1. Masquerade
                                                      1. Session Hijacking
                                                        1. Man-in-the-Middle Attack
                                                        2. Message Confidentiality
                                                          1. Misdelivery
                                                            1. Exposure
                                                              1. Traffic Flow Analysis
                                                              2. Message Integirty Threats
                                                                1. Falsification of Messages
                                                                  1. Noise (Unintentional interference)
                                                                  2. Website Defacement
                                                                    1. Buffer Overflows
                                                                      1. Dot-dot Address problems
                                                                        1. Application Code Errors
                                                                          1. Server Side Include
                                                                          2. Denial of Service (DOS)
                                                                            1. Transmission Failure
                                                                              1. Connection Flooding
                                                                                1. Syn Flood
                                                                                  1. Traffic Redirection
                                                                                    1. DNS Attacks
                                                                                    2. Distributed DOS( DDOS)
                                                                                      1. Threats to Active and Mobile Code
                                                                                        1. Cookies
                                                                                          1. Scripts
                                                                                            1. Active Code
                                                                                          2. Network Security Control
                                                                                            1. Architecture
                                                                                              1. Segmentation
                                                                                                1. Redundancy
                                                                                                  1. Single Point of Failure
                                                                                                  2. Encryption
                                                                                                    1. Link Encryption
                                                                                                      1. End-to-end Encryption
                                                                                                      2. Strong Authentication
                                                                                                        1. One-time password
                                                                                                          1. Challenge-response systems
                                                                                                            1. Kerberos
                                                                                                            2. Access Control
                                                                                                              1. Router and Firewall
                                                                                                                1. Intrusion Detection System
                                                                                                                2. Alarms and Alerts
                                                                                                                  1. Honeypots
                                                                                                                    1. Traffic Flow Security

                                                                                                                    Semelhante

                                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                                    Mike M
                                                                                                                    CCNA Security 210-260 IINS - Exam 2
                                                                                                                    Mike M
                                                                                                                    SY0-401 Part 1 (50 questions)
                                                                                                                    desideri
                                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                                    Ricardo Nuñez
                                                                                                                    CCNA Security 210-260 IINS - Exam 3
                                                                                                                    irvin pastora
                                                                                                                    1.3 Network and Security Components
                                                                                                                    DJ Perrone
                                                                                                                    U1. OSI 7 Layer Reference Model
                                                                                                                    Craig Parker
                                                                                                                    Types of Attacks
                                                                                                                    River L.
                                                                                                                    CCNA Security 210-260 IINS - Exam 1
                                                                                                                    irvin pastora
                                                                                                                    Network Security Vocabulary
                                                                                                                    Shantal K Green
                                                                                                                    Maximizing Efficiency: A Comprehensive Guide to Cloud Services for Your Business
                                                                                                                    Andrew James