Security and Data Management

?
  • Created by: lisamiles
  • Created on: 26-11-18 11:08
View mindmap
  • Security and Data Management
    • Network security
      • User access levels
      • Suitable passwords
        • Brute force attack
      • Encryption techniques
        • XOR
          • The XOR logical operator has two inputs and one output. The output is 1 only if A and B are different.
    • Compression
      • Lossy
      • Lossless
    • Network policies
      • Acceptable use
      • Disaster recovery
      • Backup
      • Archiving
    • Cyber security
      • Malware
      • Viruses
      • Worms
      • Spyware
      • Trojans
      • Protection against malware
        • Install virus software
        • Firewall
        • Keep OS up to date
        • Use latest versions of web browsers
        • Look out for phishing emails
    • Forms of cyberattack
      • Shoulder surfing
      • SQL Injection
      • DOS Attack
      • Password based attacks
        • Dictionary attack
        • Brute force attacks
        • Guess??
      • IP address spoofing
      • Social engineering
    • Identifying vulnerabilities
      • Footprinting
      • Ethical hacking
      • Penetration testing
    • Protecting software systems
      • Secure by design
      • Buffer overflow attacks
      • Permissions
      • Scripting restrictions
      • Accepting parameter without validation

Comments

Timothy Hoadley

Report

Ensuring the security and effective management of data is essential for any organization, and with the increasing dependence on technology, it has become more important than ever. It services Singapore offers reliable and comprehensive solutions to meet these requirements, enabling businesses to protect their sensitive information and streamline their data management processes.

Similar Computing resources:

See all Computing resources »See all Networks resources »