Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security Practice (Enterprise (Database (DRP, Encryption), Firewalls,…
Security Practice
Enterprise
Firewalls
Proxies
VPN
VLAN
Database
DRP
Encryption
Antivirus Software
OS/Server Security Software
Physical
Forensic Analysis,
Surveillance
Sensors
Tokens
Smart Cards
Device
Mobile
Source Code Encryption
Secure the Device: Detecting Compromised and Vulnerable Run-Time Environment
Secure the Data: Preventing Data Theft and Leakage
Secure the Transaction: Controlling the Execution of High-Risk Mobile Transactions
Database Encryption, and 3. File-level Encryption
MAM/MDM Integration
Protection of Data In Transit
IoT
Embedded firewall
Secure Boot
Secure code update
Data Security
Authantication
Secure Communication
Intrusion detection and security monitoring
Embedded security management
Device tampering detection
Desktop
Web
SQL Injection
Cross site scripting
DOS/DDOS
Path Disclosure
Memory corruption
Arbitrary code execution
Data breach
Local file inclusion
Arbitrary file inclusion
Cross-site request forgery
Cloud
Private
Public
Hybrid