Please enable JavaScript.
Coggle requires JavaScript to display documents.
Information Operations, Information security - Coggle Diagram
Information Operations
Administration
Servers
Windows
AIX
Linux
Virtual
Physical
Endpoints
Windows
Mac OS
Software install
Service desk
Executive support
Monitoring
Incident response
Problem management
Automation
Business Continuity | Disaster Recovery | BackUps
Networking
Telecommunications
Messaging
Hardware
Software Defined
Architect
Logical
Solution
Database Administration
SQL
Sybase
DB2
Information security
Architecture
What's being done
How it being done
When is it being done
How dangerous is it
How much will it cost
Time
Consulting
Equipment
Engineering
Endpoint
Server
Windows
Container
Linux
Client
Windows
Linux
MacOS
Appliance
Controls
Hardware
Antivirus
Data loss prevention
Firewall
Exploit and Next Gen
Baseline
Network
Internal
External
Cloud
Application
API
Code verification
Operations
Maintenence
Day-to-day
Automation
Governance
Risk
Assurance
Compliance
Identity
Decentralized
LDAP/RACF Management
Role Based Access Control
Centralized
SSO
Federated
Multifactor
LDAP
Role Based Access Control
Threat Management
Blue
Iterative Detection
Alerts/Hunting
Gap Identification
Threat Hunting
Brand Protection
Threat Intelligence
Red
OSINT
Iterative System Testing
Exploit Testing
Adversary Emulation
Physical Penetration Testing