Please enable JavaScript.
Coggle requires JavaScript to display documents.
SECURITY VULNERABILITES AND CONTROLS - Coggle Diagram
SECURITY VULNERABILITES AND CONTROLS
CONTROLS
ENCRYPTION
encoding information to make data unreadable from authorized users
SOFTWARE UPDATES
upgrade or update software to a new version
USER AUTHENTIFICATION
providing proof / validating a computer system user from those unauthorized to access
SOFTWARE AUDITING AND TESTING STRATEGIES
review, independent investigation / examination of a system to assess quality / in search of issues
VERSION CONTROL
recording changes to a file or set of files over time so that you can recall specific versions later
VULNERABILITES
CROSS-SITE SCRIPTING (XSS)
XSS allows attackers to inject client-side scripts into web pages (web applications) viewed by other users, controls incl escaping of data entries
SQL INJECTIONS
code injection attacking data apps thru inserting scripts into an entry field for execution, controls incl complete validation
SOCIAL ENGINEERING (PHISING)
manipulation of people online to gain access to information ie phishing, controls incl training
3RD PARTY SOFTWARE
software / programs developed by 3rd parties, not the producers of an OS, controls incl training to recognise malicious apps
MAN-IN-THE-MIDDLE ATTACKS
malicious third party gains access to conversion bw two parties, gaining information two parties intending to send to each other, controls incl
DIMINISH DATA INTEGRITY
accuracy and consistency (validity) of data over its life, controls incl patches and updates
DATA BREACHES
unauthorized access to data can lead to data loss, controls incl encryption