Computer Security

Descrição

BSIP (ECIH) Mapa Mental sobre Computer Security, criado por azamuddin em 24-05-2014.
azamuddin
Mapa Mental por azamuddin, atualizado more than 1 year ago
azamuddin
Criado por azamuddin mais de 10 anos atrás
252
1

Resumo de Recurso

Computer Security
  1. A.2 Operational Categories
    1. Prevention
      1. create information security policy
        1. User Training
          1. Access Control
            1. Firewall
            2. Detection
              1. Whistle Blower
                1. Intrusion Detection System
                  1. Integrity Assurance Software
                  2. Respond
                    1. unpluggin Network Cable
                      1. Blocking IP Address
                      2. Recovery
                        1. Disk Mirorring
                          1. Automated Backup
                        2. A.1 Computer Security Incident
                          1. A.1.1 Characteristic
                            1. The Attacker or Origin
                              1. Tools Used
                                1. Vulnerability Exploited
                                  1. Action Performed
                                    1. Intended Target
                                      1. Unauthorized Result
                                        1. Attack Objectives
                                        2. A.1.3 CSIRT
                                          1. Why Need? Benefit?
                                            1. Economic
                                              1. Public Relation
                                                1. Legal
                                                2. Goal & Objective
                                                  1. Activities
                                                    1. Non Real Time
                                                      1. Pre Incident
                                                        1. Charter
                                                          1. Mission Statement
                                                            1. types of incidents - A.1.2
                                                              1. service provided
                                                                1. constituenty
                                                                  1. Authority & Funding
                                                                  2. Policy
                                                                    1. Incident Reporting Procedures
                                                                      1. PoC
                                                                        1. Various Contact types
                                                                          1. Team members
                                                                            1. Work hours
                                                                              1. Time Zone
                                                                              2. Who report?
                                                                                1. Incident Symptom awareness
                                                                                2. Incident Tracking & Handling Procedure
                                                                                3. Post Incident
                                                                                4. Real Time
                                                                                  1. Incident Handling
                                                                                    1. Identify Incident
                                                                                      1. determine actual incident
                                                                                        1. verify, security or non-security?
                                                                                          1. Incident Prioritization
                                                                                          2. Containtment
                                                                                            1. Eradicate
                                                                                            2. Incident Recovery
                                                                                              1. Identify Damage
                                                                                                1. Repair System
                                                                                                  1. Restore System
                                                                                                  2. Investigation
                                                                                                    1. Identify Cause
                                                                                                      1. Forensic
                                                                                                      2. Collect Evidence
                                                                                                        1. Volatile
                                                                                                          1. Non Volatile
                                                                                                          2. Assign Blame
                                                                                                          3. reoccurrence prevvention
                                                                                                            1. Restitution
                                                                                                              1. Communication
                                                                                                          4. A.1.2 Types and Categories of CSI
                                                                                                            1. Service Interrupts
                                                                                                              1. System Interferrence
                                                                                                                1. Unauthorized Access
                                                                                                                  1. Commercial use
                                                                                                                    1. Malicious Communication
                                                                                                                      1. Theft
                                                                                                                        1. Unsolicitated Bulk Mail
                                                                                                                          1. Other

                                                                                                                        Semelhante

                                                                                                                        Certified Information Systems Security Professional (CISSP)
                                                                                                                        GoAsk Chaz
                                                                                                                        SSCP Domains
                                                                                                                        Abdul Issa
                                                                                                                        Computer Security Potential Flaws
                                                                                                                        Rob Speirs
                                                                                                                        Risk Assessment
                                                                                                                        azamuddin
                                                                                                                        Psicologia da Educação
                                                                                                                        rsgomes88
                                                                                                                        Engenharia de Produção
                                                                                                                        ismael-airoso
                                                                                                                        Brasil Império
                                                                                                                        kl.a.b
                                                                                                                        Fontes e princípios do direito do trabalho
                                                                                                                        Natthan Réryson
                                                                                                                        05 - Atos Administrativos
                                                                                                                        Silvio R. Urbano da Silva
                                                                                                                        Guia - Projeto de Pesquisa e ABNT
                                                                                                                        Joana Meira
                                                                                                                        Investigação científica
                                                                                                                        Claudina Quintino