Начать. Это бесплатно
или регистрация c помощью Вашего email-адреса
INTERNET SECURITY создатель Mind Map: INTERNET SECURITY

1. Definition

2. Computer security principle (CIA)

2.1. Confidentiality (Secrecy)

2.2. Integrity

2.3. Availability

3. Types of Computer Security

3.1. ACTIVE SECURITY

3.1.1. ACCESS CONTROL

3.1.2. ENCRYPTION

3.1.2.1. Cryptography

3.1.3. COMPUTER SECURITY SOFTWARE

3.1.4. DIGITAL SIGNATURES AND CERTIFICATES

3.1.5. SECURE PROTOCOLS

3.2. PASSIVE SECURITY

3.2.1. CLEANING TOOLS

3.2.2. BACKUP COPIES

3.2.3. UNIQUE POWER SUPPLY SYSTEMS (UPS)

3.2.4. NAS DEVICES.

3.2.5. REDUNDANT SYSTEMS

4. Logical security and Physical security

4.1. PHYSICAL SECURITY

4.2. LOGICAL SECURITY

5. Security of people and information systems

5.1. Security of information systems

5.1.1. Security of people

6. Big Data

7. Internet of Things

8. Passive and Active Attack

8.1. Active attack

8.2. Passive Attack

9. Protection of Networks

9.1. Firewall

9.2. Virtual Private Networks (VPN)

9.2.1. Remote access VPN

9.2.2. Site-to-site VPNs

10. HTTPS and web server SSL / TLS certificates

11. Security Threats

11.1. Virus

11.1.1. How do they work?

11.1.1.1. Protection

11.2. Spyware

11.2.1. How do they work?

11.2.1.1. Protection

11.3. Trojan horses

11.3.1. How do they work?

11.3.1.1. Protection

11.4. Worms

11.4.1. How do they work?

11.4.1.1. Protection

11.5. Scareware

11.5.1. Protection

11.6. Adware

11.6.1. Protection

11.7. Hackers

11.8. Crackers

11.8.1. Crackers vs Hackers

11.9. Pharming

11.9.1. Protection

11.10. Cookies

11.10.1. Protection

11.11. Hoaxes

11.12. Phising

11.12.1. Protection

11.13. Spam

12. Protection measures

12.1. 1. Effective antivirus

12.2. 2. Security updates

12.3. 3. Backups

12.4. 4. Personal firewalls

12.5. 5. Common sense