Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cybersecurity - Coggle Diagram
Cybersecurity
Types of Cyber Attacks
Malware
Ransomware
Fileless Attacks
Phishing
Man-in-the-Middle (MitM) Attack
Malicious Apps
Denial of Service Attack
Zero-Day Exploit
DNS Tunneling
DNS Spoofing
SQL injection
Jailbreaking and Rooting
OS exploits
Others-Cyber Attacks
Cloud Security
Identity and Access Management (IAM)
Privileged Access Management (PAM)
Multi-factor Authentication (MFA)
Access Controls and Permissions
Single Sign-On (SSO)
Others-IAM
User Provisioning and De-provisioning
Self Service Password Reset (SSPR)
Data Privacy and Compliance
Cloud Architecture and Design
Cloud-based Threat Intelligence
Cloud Service Provider (CSP) Security
Cloud Governance and Compliance
Cloud Data Protection and Encryption
Cloud Security Compliance and Auditing
Cloud Security Monitoring and Incident Response
Cloud Architecture and Configuration Security
Cloud Security Assessments
Others-Cloud Security
Network Security
Firewalls
Intrusion Detection Systems (IDS)
Intrusion Prevention Systems (IPS)
Virtual Private Networks (VPNs)
Network Access Control (NAC)
Wireless Network Security
Network Traffic Monitoring and Analysis
Denial of service (Dos) Protection
Network Segmentation
Others-Network Security
Social Engineering and Human Factors
Security Culture and Employee Training
Impersonation and Identity Theft
User Behavior Analysis
Incident Reporting and Response
Social Media Engineering Attacks
Baiting and Tailgating
Phishing Awareness and Prevention
User Security Education and Best Practices
Pretexting
Others-Social Engineering
Application Security
Secure Software Development Lifecycle (SDLC)
Secure coding practices
Web Application Firewalls (WAF)
Web Application Security Testing
Secure authentication and access controls
Mobile Application Security
Application Firewalls
Secure APIs and Web Services
Code analysis and vulnerability testing
Others-Application Security
Data Security
Database Security
Access Control
Data Backup and Recovery
Database Security and Privacy Controls
Data Loss Prevention (DLP)
Secure Data Sharing and Transfer
Data Classification
Others-Data Security
Data Encryption and Cryptography
Endpoint Security
Endpoint Protection Platforms (EPP)
Endpoint Detection and Response (EDR)
Host-based Intrusion Detection Systems (HIDS)
Mobile Device Security
Antivirus/Antimalware Solutions
Endpoint Encryption
Patch Management
Others-Endpoint Security
Threat Intelligence and Monitoring
Security Information and Event Management (SIEM)
Vulnerability Assessment and Penetration Testing (VAPT)
Security Operations Center (SOC)
Patch and Configuration Management
Threat Hunting and Incident Response
Vulnerability Management
Log Management and Analysis
Others-Threat Intelligence and Monitoring
Physical Security
Security Guards and Procedures
Environmental Controls (e.g., temperature, humidity)
Biometric Security
Secure Hardware Disposal
Video Surveillance Systems
Perimeter Security
Others-Physical Security
Access Control Systems
Mobile Security
Mobile Threat Defense (MTD)
Secure Mobile App Development
Mobile Application Security
Mobile Data Protection
App Permissions and Privacy
Others-Mobile Security
Mobile Device Management (MDM)
Security Governance and Risk Management
Risk Assessment and Management
Compliance Management
Security Policies and Procedures
Business Continuity and Disaster Recovery Planning
Security Awareness and Training
Others-Security Governance and Risk Management
IoT Security
IoT Privacy
IoT Firmware and Software Updates
IoT Network Security
IoT Data Security
IoT Device Security
Others-IoT Security
Industrial Control Systems (ICS) Security
Control System Network Segmentation
ICS Intrusion Detection Systems
SCADA and ICS Security Assessments
Critical Infrastructure Protection
Others-ICS
Information security
Zero Trust
Regulatory
compliance
Critical infrastructure security
Disaster recovery and
business continuity