Get Started. It's Free
or sign up with your email address
CHAPTER 1 by Mind Map: CHAPTER 1

1. TOOLS IN INFORMATION SECURITY

1.1. NETWORK MAPPER

1.2. NETSTAT

1.3. NETSCAN

2. INFORMATION SECURITY

2.1. USED TO DESCRIBE THE TASK OF SECURING INFORMATION THAT IS IN A DIGITAL FORMAT

2.2. CIA

2.2.1. CONFIDENTIALITY

2.2.2. INTEGRITY

2.2.2.1. INFORMATION IS CONSISTENT ACCURATE AND TRUSTWORTHY

2.2.3. AVAILABILITY

2.2.3.1. INFORMATION EASILY ACCESIBLE

3. ATTACKERS VS HACKERS

3.1. ATTACKERS ARE SOMEONE ACTUALLY WANT ATTACK OR HARM YOUR COMPUTER

3.2. HACKERS IS SOMEONE WHO JUST EXPLORE YOUR COMPUTER JUST TO TEST THEIR ABILITY

4. COMPUTER THREATS

4.1. UNSTRUCTURED THREATS

4.2. STRUCTURED THREATS

4.3. INTERNAL THREATS

4.4. EXTERNAL THREATS

5. TYPE OF SECURITY ATTACK

5.1. RECONNAISSANCE ATTACK

5.1.1. PACKET SNIFFER

5.1.2. PORT SCANS

5.1.3. PING SWEEP

5.1.4. INTERNET INFORMATION QUARIES

5.2. ACCESS ATTACK

5.2.1. PASSWORD ATTACK

5.2.2. TRUST EXPLOITATION

5.2.3. POST REDIRECTION

5.2.4. MAN IN THE MIDDLE ATTACK

5.2.5. PHISHING

5.3. DENIAL OF SERVICE ATTACK

5.3.1. BUFFER OVERFLOW ATTACK

5.3.2. SYN FLOOD ATTACK

5.3.3. TEARDROP ATTACK

5.3.4. PING OF DEATH ATTACK

5.3.5. DDOS

5.4. DISTRIBUTED DENIAL OF SERVICE ATTACK

5.5. MALICIOUS CODE ATTACK

5.5.1. VIRUSES

5.5.2. TROJAN HORSE

5.5.3. WORMS

6. COMMON TYPE OF SOCIAL ENGINERING

6.1. PHISHING

6.2. PRETEXTING

6.3. VISHING

7. INFORATION SHOULD ONLY AVAILABLE TO THOSE WITH PROPER AUTHENTICATION