WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
This Concept Map, created with IHMC CmapTools, has information related to: IA Mapping - Stark, Computer Utilizes Forensic Tool Kit, Forensics Encompasses Network, Natural Disasters Involves Tornadoes, Risk Management Performs Gap Analysis, Computer Utilizes Voluntility, Information Assurance Manages Policies, BIS Governance Complies with Electronic Communication Privacy Act (1986), Authentication Results in Authorization, Availability Utilizes Business Continuity/ Disaster Recovery Plan, Security Hardware/ Software Encompasses Firewall, Authentication Needs Two-factor authentication, Policies Includes Acceptable Use, Information Assurance Increases Availability, Man-made Disasters Involves Social Engineering, Incident Response Plan Includes Forensics, Data Center To recover Hot Site, Policies Includes Annual Policy Reviews & Updates, Incident Response Plan Helps Harden systems, Risk Anaylsis ???? Mitigation, Policy Revisions ???? When?