Please enable JavaScript.
Coggle requires JavaScript to display documents.
chapter 14 - Coggle Diagram
chapter 14
security architecture
contextual
conceptual
logical
physical
component
security service management
types of malware
adware
auto-rooter
backdoor/trapdoor
exploit
downloader
good malware software
scan critical host components
watch real-time activities
monitor common applications
scan files for known malware
capable of quarantining files
recognizing sensitive data in real time
rule-based
database fingerprinting
exact file matching
partial document matching
deploying provisioning and user access process
centralized
decentralized
federated