User:Jheijmann/Books/ICT Security Stuff
Appearance
The Wikimedia Foundation's book rendering service has been withdrawn. Please upload your Wikipedia book to one of the external rendering services. |
You can still create and edit a book design using the Book Creator and upload it to an external rendering service:
|
This user book is a user-generated collection of Wikipedia articles that can be easily saved, rendered electronically, and ordered as a printed book. If you are the creator of this book and need help, see Help:Books (general tips) and WikiProject Wikipedia-Books (questions and assistance). Edit this book: Book Creator · Wikitext Order a printed copy from: PediaPress [ About ] [ Advanced ] [ FAQ ] [ Feedback ] [ Help ] [ WikiProject ] [ Recent Changes ] |
ICT Security Stuff
[edit]Several aspects
[edit]- Inleiding
- Architecture framework
- Enterprise architecture framework
- Information
- Computer
- Communication
- Security
- HVAC
- 1 Computers
- Computer hardware
- Software
- Operating system
- Virtual machine
- Firmware
- Peripheral
- Load balancing (computing)
- Electromagnetic interference
- 2 Communication
- Computer network
- OSI model
- Lists of network protocols
- Data transmission
- Telecommunications network
- Wide area network
- Local area network
- Bandwidth (computing)
- Internet
- Data transmission
- Cable
- 3 ICT Security
- Human security
- Physical security
- Internet security
- Computer security
- Application security
- Data security
- Communications security
- Information security
- Network security
- Standard RAID levels
- Computational criminology
- Cyber security standards
- 3.1 Threats
- Threat (computer)
- Responsibility assignment matrix
- Vulnerability
- Hacker
- Malware
- Encryption
- Threat (computer)
- Malware
- Hacker
- Vulnerability
- Attack (computing)
- Denial-of-service attack
- 3.2 Controls - measures - objects
- Security controls
- ISO/IEC 27000-series
- IT Baseline Protection Catalogs
- Responsibility assignment matrix
- Training
- Awareness
- Classified information
- Authorisation
- Authentication
- Public key certificate
- Password
- Honeypot (computing)
- Common Criteria
- Encryption
- Firewall (computing)
- Intrusion detection system
- Intrusion prevention system
- Log analysis
- Sandbox (computer security)
- 3.3 Monitoring
- Business transaction management
- Application performance management
- Network monitoring
- System monitoring
- Website monitoring
- 4 Risk Management
- Risk management
- IT risk
- 5 ICT Security Audits
- Generally Accepted Auditing Standards
- Government Auditing Standards
- Audit and Assurance Standards issued by ICAI
- International Standards on Auditing
- Penetration test
- Information technology security audit
- 6 References - WikiBooks
- Book:IT Fundamentals
- Book:Computer Networks
- Book:Network Security and Management
- Book:OSI
- Book:Electronics
- Book:Internet security
- Book:Internet Protocol Analysis
- Book:Malware
- Book:Quick Guide to Malware
- Book:Electromagnetism
- Book:Physics
- Book:ICSE Physics
- Book:Complete Algebra Course
- Book:Mathematics
- Book:College Mathematics: Algebra
- Book:Algebraic Mathematics and Logics
- Book:Mathematical Logic
- Book:Energy
- Book:Maxwell's equations
- Book:Atom Elementary Particles
- Book:1
- Book:Quantum Mechanics
- Book:Natural Science2
- Book:Topics in Physics and Math
- Book:Structural Engineering Fundamentals
- Book:Magnetism Rev 2
- Book:History of Computers
- Book:Boolean Logic
- Book:Quantum Algebra and Quantum Computers
- Book:An introduction to electronics
- Book:Fundamentals of Digital Electronics
- Book:Hoaxes Vol.4
- Book:Anonymous
- Book:Radio-Crypto
- Book:IT Service Management
- Book:Internet 2015
- Book:Web browser
- Book:Jargon of the Dark Web
- End