User:Jheijmann/Books/ICT Security Stuff

From Wikipedia, the free encyclopedia


ICT Security Stuff[edit]

Several aspects[edit]

Inleiding
Architecture framework
Enterprise architecture framework
Information
Computer
Communication
Security
HVAC
1 Computers
Computer hardware
Software
Operating system
Virtual machine
Firmware
Peripheral
Load balancing (computing)
Electromagnetic interference
2 Communication
Computer network
OSI model
Lists of network protocols
Data transmission
Telecommunications network
Wide area network
Local area network
Bandwidth (computing)
Internet
Data transmission
Email
Cable
3 ICT Security
Human security
Physical security
Internet security
Computer security
Application security
Data security
Communications security
Information security
Network security
Standard RAID levels
Computational criminology
Cyber security standards
3.1 Threats
Threat (computer)
Responsibility assignment matrix
Vulnerability
Hacker
Malware
Encryption
Threat (computer)
Malware
Hacker
Vulnerability
Attack (computing)
Denial-of-service attack
3.2 Controls - measures - objects
Security controls
ISO/IEC 27000-series
IT Baseline Protection Catalogs
Responsibility assignment matrix
Training
Awareness
Classified information
Authorisation
Authentication
Public key certificate
Password
Honeypot (computing)
Common Criteria
Encryption
Firewall (computing)
Intrusion detection system
Intrusion prevention system
Log analysis
Sandbox (computer security)
3.3 Monitoring
Business transaction management
Application performance management
Network monitoring
System monitoring
Website monitoring
4 Risk Management
Risk management
IT risk
5 ICT Security Audits
Generally Accepted Auditing Standards
Government Auditing Standards
Audit and Assurance Standards issued by ICAI
International Standards on Auditing
Penetration test
Information technology security audit
6 References - WikiBooks
Book:IT Fundamentals
Book:Computer Networks
Book:Network Security and Management
Book:OSI
Book:Electronics
Book:Internet security
Book:Internet Protocol Analysis
Book:Malware
Book:Quick Guide to Malware
Book:Electromagnetism
Book:Physics
Book:ICSE Physics
Book:Complete Algebra Course
Book:Mathematics
Book:College Mathematics: Algebra
Book:Algebraic Mathematics and Logics
Book:Mathematical Logic
Book:Energy
Book:Maxwell's equations
Book:Atom Elementary Particles
Book:1
Book:Quantum Mechanics
Book:Natural Science2
Book:Topics in Physics and Math
Book:Structural Engineering Fundamentals
Book:Magnetism Rev 2
Book:History of Computers
Book:Boolean Logic
Book:Quantum Algebra and Quantum Computers
Book:An introduction to electronics
Book:Fundamentals of Digital Electronics
Book:Hoaxes Vol.4
Book:Anonymous
Book:Radio-Crypto
Book:IT Service Management
Book:Internet 2015
Book:Web browser
Book:Jargon of the Dark Web
End