Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security - Coggle Diagram
Security
mitigation controls
honeypot
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems
encrytion
The method by which information is converted into secret code that hides the
information. Encrypting and decrypting information is called cryptography. Unencrypted data is also known as plaintext, and encrypted data is called ciphertext.
user access levels
Any type of access which allows/permits the User to act on behalf of the Account Holder. User access can be given digitally by an administrator.
-
Anti virus
a program designed to detect and remove viruses and other kinds of malicious software from your computer or laptop. Malicious software - known as malware - is code that can harm your computers and laptops, and the data on them.
Firewalls
a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Staff Training
a programme implemented by a manager or person of authority to provide specific staff members with the necessary skills and knowledge for their current role
Back-Ups ( Full, Incremental , Differential )
the process of creating a copy of the data on your system that you use for recovery in case your original data is lost or corrupted.
-
VPN
Mechanism for creating a secure connection between a computing device and a computer network, or between two networks, using an insecure communication medium such as the public Internet.
technical threats
malware
a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behaviour an attacker wants.
Weak passwords
Can lead to employees passwords being cracked allowing hackers to easily get into sensitive data and gain access to places that should be secured.
Out of date software
This is also referred to as legacy software and can lead to hackers being able to more easily get into a network
SQL Injection
A code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques.
Ransomware
threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off.
DDOS
a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users
Phishing
a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
non technical threats
-
Flooding
A natural disaster that could cause damage to physical components such as servers. can be prevented by having elevated servers or flooding protocols
Theft
This would cause the business to be less trusted by customers as the data they trust the business with has been stolen. this could lead to the business getting a bad reputation
-
-
-