Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security - Coggle Diagram
Security
mitigation controls
User Access
The authorization given to users that enables them to access specific resources on the network, such as data files, applications, printers and scanners
Staff Training
Training and development is an ongoing process where companies help their employees acquire the knowledge and skills needed to reach their full potential and optimum performance
Encryption
encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.
Back Ups
a backup, or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event
-
Software
Software is a set of instructions, data or programs used to operate computers and execute specific tasks.
Firewalls
a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
Air Gaps
An air gap, air wall, air gapping or disconnected network is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks
-
Honey Pot
It's a sacrificial computer system that's intended to attract cyberattacks, like a decoy. It mimics a target for hackers, and uses their intrusion attempts to gain information about cybercriminals and the way they are operating or to distract them from other targets
NCSC
The National Cyber Security Centre is an organisation of the United Kingdom Government that provides advice and support for the public and private sector in how to avoid computer security threats.
VPN's
they describe the opportunity to establish a protected network connection when using public networks. VPNs encrypt your internet traffic and disguise your online identity.
-
-