Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cybersecurity, Configuration management, The telemetry - Coggle Diagram
Cybersecurity
defence methods
-
-
guidelines
CIA
confidentiality, integrity, and availability
-
-
-
digital certificate
-
-
protocols
-
There are three Digital Signature Standard (DSS) algorithms that are used for generating and verifying digital signatures:Digital Signature Algorithm (DSA)
-
-
-
-
-
-
-
mallware
types
worm
components
-
a propagation mechanism
The worm attack not only affects one computer, but replicates to other computers
-
-
-
-
-
-
-
-
type of attacks
-
passive
-
man-in-black :red_cross:
DHCP
Wrong default gateway that is used to create a man-in-the-middle attack and allow the attacker to intercept data
-
-
-
-
-
-