Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computer Security (Physical Security (Biometrics (Scan Fingerprints, Scan…
Computer Security
Physical Security
Level of security depends on resources and value of what you're protecting
Armed Guards/ Security Guards for high end information
Biometrics
Scan Fingerprints
Scan Retina
Access control cards
User Awarness
Locking down Laptops
Disabling USB and Ethernet Ports not in use
https://www.sans.edu/cyber-research/security-laboratory/article/281
Computer Security
Encrypt Computer Files
Allow two factor authentication
Requires Passwords of Files
Backup Files
Keep Software up to date
https://www.consumer.ftc.gov/articles/0009-computer-security
Network Security
Confirm Users are on the secured network
Prevent non users from being on the Network
Disable Ethernet Ports not in use
Set a strong password for the router
Change the Admin password
Backup Router to a offsite location
Social Engineering
Is a vicious cycle of gaining trust and then attacking
Identifies the Victim to engage.
Gains the victims trust/Makes up a story.
Launches attack to disrupt company flow or extract something, continues charade they're telling the victim.
Brings charade to an end, covers tracks.
https://www.incapsula.com/web-application-security/social-engineering-attack.html