Security and Data Management
- Created by: lisamiles
- Created on: 26-11-18 11:08
View mindmap
- Security and Data Management
- Network security
- User access levels
- Suitable passwords
- Brute force attack
- Encryption techniques
- XOR
- The XOR logical operator has two inputs and one output. The output is 1 only if A and B are different.
- XOR
- Compression
- Lossy
- Lossless
- Network policies
- Acceptable use
- Disaster recovery
- Backup
- Archiving
- Cyber security
- Malware
- Viruses
- Worms
- Spyware
- Trojans
- Protection against malware
- Install virus software
- Firewall
- Keep OS up to date
- Use latest versions of web browsers
- Look out for phishing emails
- Forms of cyberattack
- Shoulder surfing
- SQL Injection
- DOS Attack
- Password based attacks
- Dictionary attack
- Brute force attacks
- Guess??
- IP address spoofing
- Social engineering
- Identifying vulnerabilities
- Footprinting
- Ethical hacking
- Penetration testing
- Protecting software systems
- Secure by design
- Buffer overflow attacks
- Permissions
- Scripting restrictions
- Accepting parameter without validation
- Network security
Comments
Report