Mind Map
Visual overview of Computer Security (Cybersecurity): Threats, Vulnerabilities, and Malware
Mind Map
Computer Security (Cybersecurity) Scope
Main Topic
đĄ
Computer Security Scope and Risk Thinking
đ
Vulnerabilities, Threats, and Exploitability
đŻ
Attack Categories: Backdoors, DoS, and Physical Access
â¨
Eavesdropping and Network Confidentiality
đ
Malware Fundamentals and Impacts
đ
Malware Types: Viruses, Worms, Trojans, Spyware, Scareware, Ransomware
đ
Man-in-the-Middle (MITM) and Multi-Vector Polymorphic Threats
đ§
Phishing and Social Engineering as a Cross-Cutting Entry Point
đ
Key Takeaways
Backdoors Turn Exploits Into Control
Encryption Can Hide Attacks
Backdoors Turn Exploits Into Control
DoS Can Be Account-Locking
Encryption Can Hide Attacks
DoS Can Be Account-Locking
Backdoors Turn Exploits Into Control
SMBs Face More âOpportunisticâ Vectors
Backdoors Turn Exploits Into Control
SMBs Face More âOpportunisticâ Vectors
SMBs Face More âOpportunisticâ Vectors
MITM Enables Credential Theft Quietly
Computer Security (Cybersecurity) scope deâŚ
Vulnerabilities differ from exploitable vuâŚ
Attack Categories (Backdoors, DoS, PhysicaâŚ
Malware is a central mechanism that can inâŚ
Total Nodes:26|Connections:41|9 topics ¡ 16 details
Hover over nodes to explore