Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyber Security Fundamentals - Coggle Diagram
Cyber Security Fundamentals
CIA Triad
Confidentiality
ensure that only authorized individuals access to data, by restricting access through authentication encryption.
Integrity
assures that the information is accurate and trustworthy during its entire life cycle.
Availability
ensures that the information or data is accessible to authorized people all the time.
CyberSecurity
It is an ongoing effort to protect networked systems and data from unauthorized use or harm.
CyberSecurity Threats
Modification
No-Backup
Script Kiddies
Hackers
Insiders
Natural Disasters
Malicious Software
Malware
Unauthorized User
Security Services
Authentication
Peer Entity
Data Origin
Access Control
Data Confidentiality
Connection
Connectionless
Selective Field
Traffic Flow
Data Integrity
Connection with Recovery
Connectionless without Recovery
Selective Field Connection
Connectionless
Selective Field Connectionless
Non-Repudiation
With Proof of Origin
With Proof of Delivery
Security Mechanisms
Specific Security Mechanism
Encipherment
Symmetric
Asymmetric
Digital Signature
Access Control
Data Integrity
Pervasive Security Mechanism
Trusted Functionality
Security Label
Event Detection
Security Audit Trail
Security Recovery
Types of Attacks
Active Attacks
Replay Attack
Fabrication Attack
Passive Attacks
Traffic Analysis
Interception
Types of Attackers
Hackers
Organized Hackers
Amateurs
Data Breaches
Gmail
Hacking Team
Yahoo
Stolen Information
Password Guessing
Phishing
Security Vulnerabilities
Lack of Strong Password
Lack of Malware Removal Tools
Poor Access Controls
Unpatched Software
Device Misconfiguration