Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security Principles - Coggle Diagram
Security Principles
Hacker tool
Vulnerability exlotitation
Encryption
Debuggers
Fuzzers to search vulnerabilities
Packet sniffers
Network scanning and hacking
Password crackers
Wireless hacking
Packet cafting
Rootkit detectors
Forensic
Hacking openrating systems
Virus
Remote-access
Trojan Horse Classification
Security Software disabler
Data-sending
Destructive
Proxy
FTP
Dos
Explain Common Security Terms
Asset
Properties
Vehicles
Employee
Data
Computers
Buildings
Plants
Vulnerability
Exploit
Threat
Intentional
Accidental
Attack
Sniffing
Spoongfing
Man In Middle
Denial-Of-Servies (Dos )
TCP/IP hijacking
Phishing
Countermeasures
Risk
Asset
Threat
Vulnerability
Malware
phishing
adware
ransomware
spyware
scareware
rootkits
Modern hacking titles
State-sponsored hackers
Hacktivists
Script kiddies
Vulnerabiliry brokers
Cyber criminals
Worm
Payload
Enabling vulnerability
Propagation mechanism
Explain CIA Triad
Confidentiality
Integrity
Availability
Security Information and Event Management (SIEM)
SIEM's Core Features
Dash Boar
Threat Intelligence
Compliance Reporting
Log data Management
Fine Tuning Alert Conditions
SEM ( Security Event Management)
SIM ( Security information Managegmet)
Explain Network Security zones
Trusted zone
Untrusted Zone
Demilitarized zone
Hacker
Back hat hacker
White hat hackers
Gray het hackers
Common Security Terms
Administrative Countermeasure
Physical Countermeasure
Logical Countermeasure
Expalin Confidentiality