Please enable JavaScript.
Coggle requires JavaScript to display documents.
CYBER SECURITY - Coggle Diagram
CYBER SECURITY
Cyber Kill Chain
Actions of Objectives
Weaponization
Installation
Delivery
Reconnaissance
Exploitation
Command and Control (C2)
Data Privacy of 2012
Personas
Data Subject
Personal Information controller
Personal Information Processor
Backups
Brave Browser
HTTPS
Private Browsing (incognito)
VPN
Firewall
Distrust Attitude
Personal Information
Name
Address
Date of Birth
Credit card number
Financial Information
Health Information
Cyber Threat Landscape
The Enemy"s Strategy
Phishing
Zombie
Exploit
C and C
Zero - Day
DDoS
Botnet
The Weapons
Trojan
Virus
Rootkit
Worm
The Enemy
Cybercriminals
Script Kiddies
Hacktivist
States