Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 3: COUNTERMEASURES IN CYBERSECURITY - Coggle Diagram
CHAPTER 3: COUNTERMEASURES IN CYBERSECURITY
3.1 Level of IT Infrastructure Types
Data
Application
Network
Physical
3.2 Infrastructure Security
Classification of Infrastructure Security
Security Topologies
Intrustion Detection
Media
Security Baseline
Device
Application Hardening
Common Infrastructure Security
VPN (Virtual Private Network)
IDS (Intrustion Detection System)
Firewalls
Honeypots
DMZ (Demilitarized Zone)
Network Monitoring and Diagnostic
3.4 Physical equipment protection
Physical Computer & Network Equipment Protection Methods
access control
hardware security
2) Environmental Protection
wireless security
location shielding
fire suppression
3.6 Cybersecurity Tools
2)Wireshark
Favorite tool for network administrators to
troubleshoot connectivity issues.
3)Autopsy
Essential in law enforcement for
digital forensics investigations.
1)Network Mapper (Nmap)
used by penetration testers to conduct
vulnerability assessments.
4)FTK Imager
3.5 Application Security Hardening
Means: Strengthening application to reduce vulnerabilities & protect against cyberattacks.
Technique:
1)Service Packs
2)Security Patches
3)Hotfixes
4)Cold Fix
5)Bug Fix
Key Practices:
1)Regularly update& patches
2)Disable unnecessary services & features
3)Use application whitelisting
3.3 Protection Against Malware
Malicious Software Protection Programms
antivirus software
firewalls
sandboxing
endpoint detection and response (EDR)
Malware type
viruses
worms
ransomware
spyware