Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 4:Informaton security (Introduction to Information Security…
Chapter 4:Informaton security
Introduction to Information Security
threat
exposure
information security
vulnerable
security
Unitentional Threats to Information System
human errors
social engineering
Deliberate threats to information system
alien software
spyware
spamware
adware
cookies
Supervisiory control and data acquisition (SCADA) Attacks
Software attacks
distributed of service attack
Denial of service attack
Remote attacks requiring user action
Cyberterrorism and cyberwarfare
Information security control
Communication control
anti-malware system
Firewalls
Business continuity planning
Disasterrecovery plan
Hot site
cold site
Access control
Authorization
Authentication
Information Systems Auditing
physical control
What organizations are doing to protect information resources.
risk analysis
risk migitation
risk limitation
risk transference
risk acceptance
risk