Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 8 : CONTROLS FOR INFORMATION SECURITY - Coggle Diagram
CHAPTER 8 : CONTROLS FOR INFORMATION SECURITY
Security - Access
Privacy - Personal Info
Availability
Internet of Things (IoT)
Detecting Attacks
Log Analysis
Intrusion detection systems (IDSs)
Continuous Monitoring
Virtualization - Running multiple systems simultaneously in one physical computer
Confidential- Sensitive organizational information
Processing Integrity
Fundamental Information Security concepts
1.Management Issue not just a technology issue
The time-based model of the information security
Responding to Attacks
Computer Incident Response Team (CIRT)
Chief Information Security Officer (CISO)
Cloud Computing - Using a browser to remotely access software, data storage, hardware and applications.
Various Preventive Controls
Process
IT solutions
Change Management
Physical Security