Security and Data Management

  • Created by: lisamiles
  • Created on: 26-11-18 11:08
View mindmap
  • Security and Data Management
    • Network security
      • User access levels
      • Suitable passwords
        • Brute force attack
      • Encryption techniques
        • XOR
          • The XOR logical operator has two inputs and one output. The output is 1 only if A and B are different.
    • Compression
      • Lossy
      • Lossless
    • Network policies
      • Acceptable use
      • Disaster recovery
      • Backup
      • Archiving
    • Cyber security
      • Malware
      • Viruses
      • Worms
      • Spyware
      • Trojans
      • Protection against malware
        • Install virus software
        • Firewall
        • Keep OS up to date
        • Use latest versions of web browsers
        • Look out for phishing emails
    • Forms of cyberattack
      • Shoulder surfing
      • SQL Injection
      • DOS Attack
      • Password based attacks
        • Dictionary attack
        • Brute force attacks
        • Guess??
      • IP address spoofing
      • Social engineering
    • Identifying vulnerabilities
      • Footprinting
      • Ethical hacking
      • Penetration testing
    • Protecting software systems
      • Secure by design
      • Buffer overflow attacks
      • Permissions
      • Scripting restrictions
      • Accepting parameter without validation

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »