null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
6169493
AUDITORIA DE SISTEMAS
Description
- vulnerabilidad, amenaza y riesgo informáticos - control informático y clasificación o tipos de control.
No tags specified
control informatico
tipos de control
vulnerabilidad
amenaza
riesgo
icfes/saber 11
Mind Map by
HERNAN ALVAREZ ZAPATA
, updated more than 1 year ago
More
Less
Created by
HERNAN ALVAREZ ZAPATA
about 8 years ago
22
0
0
Resource summary
AUDITORIA DE SISTEMAS
AMENAZA INFORMATICA
EVENTO NATURAL
PROGRAMA
CRAKER
VULNERABILIDAD INFORMATICA
VULNERABILIDAD FÍSICA
VULNERABILIDAD NATURAL
VULNERABILIDAD DEL HARDWARE Y DEL SOFTWARE
VULNERABILIDAD DE LOS MEDIOS O DISPOSITIVOS
VULNERABILIDAD POR EMANACIÓN
VULNERABILIDAD DE LAS COMUNICACIONES
VULNERABILIDAD HUMANA
RIESGO INFORMATCO
RIESGOS DE INTEGRIDAD
RIESGOS DE RELACION
RIESGOS DE ACCESO
RIESGOS DE UTILIDAD
RIESGOS EN LA INFRAESTRUCTURA
RIESGOS DE SEGURIDAD GENERAL
CONTROL INFORMATICO
POR OBJETIVO
POR JURISDICCION
POR METODOS
POR NATURALEZA
TIPOS DE CONTROL
CONTROLES GENERALES
CONTROLES OPERATIVOS
CONTROLES TECNICOS
CONTROLES PREVENTIVOS
CONTROLES CORRECTIVOS
CONTROLES DETECTIVOS
Media attachments
5dc1ca6c-06b9-4775-a930-92aa4a072c94 (image/jpg)
f9209f7d-9332-499f-8c38-5ede779cb876 (image/jpg)
22ea22bb-5222-4c1b-92f1-92ed18efb581 (image/jpg)
54af58af-ef09-434b-8add-1b25d393df37 (image/jpg)
8e129d4b-04cf-45d6-a381-107733a0b3bb (image/jpg)
1d5e856d-c53b-40c3-9d23-cc06b174d945 (image/jpg)
d59bdc16-e8ff-42fa-a4ba-69077117dc66 (image/jpg)
6125151b-7fd3-4504-a1b4-fef1df8de428 (image/jpg)
ddbbc549-6e8b-413e-9b1d-d6b237ee6902 (image/png)
4f6c68b1-6f4e-460c-8f06-266f54fbbf50.gif (image/gif)
1765c11f-8c40-4c61-81c4-72fab3e0e5f6 (image/jpg)
e8d49c28-bf66-48a7-bbcb-4f0952cdb5f5.gif (image/gif)
dc3cf6a0-eb30-439b-a235-fafda2b48863 (image/jpg)
5590bb81-3e4a-461c-8e69-40d875e53afc (image/jpg)
a05fe37d-7ec5-458d-8be3-bb64b4727821 (image/jpg)
7c5276ef-f6d1-4856-abb0-cce1e1ab61ec (image/jpg)
fe5b7e2f-a49a-43a9-8613-75a2195e0930 (image/jpg)
79179b5f-6c2e-4c33-a45a-74caf74911be (image/jpg)
1aac4170-df6f-471a-9f16-78e46ee1e724 (image/jpg)
b17b96a4-c1e5-43bd-b96c-708b8ae5dcb8 (image/jpg)
aa760bc2-429b-4b32-a3ca-c333c5e84a9d (image/jpg)
66651327-d141-4424-bc4b-f5d8b5fa9c13 (image/jpg)
b9fd2b13-44ac-4992-b415-b52eac11d788 (image/jpg)
16917421-6036-4e76-b3eb-727d9b782da8 (image/jpg)
ef9f118f-a058-45d7-b7fb-413f44a4c931 (image/jpg)
087aa8c0-920d-4dac-b0dc-c31a75626010 (image/jpg)
22073aa7-cdec-4fe4-887b-af2f86c13df6 (image/jpg)
94e1a0d2-8244-45ee-9188-6e5bbfb91b4d (image/jpg)
af81890e-0067-4e6f-8eb0-c0d40dc56003 (image/jpg)
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
AUDITORIA DE SISTEMAS
Walter Triana Hernandez
Conceptos Basicos Auditoria Sistemas
JUAN ALFONSO
CONTROL INFORMATICO
Pilar Martinez
VULNERABILIDAD, AMENAZA Y RIESGO
Richard Balseca
Auditoria de Sistemas
Juan Manuel Rojas G
AUDITORIA DE SISTEMAS
Wilson Muñoz
Vulnerabilidad
Daniel Valencia9626
Diagnóstico sobre el riesgo de inundación en el cantón de Dota
Brayna Ruiz
Conceptos Básicos de Auditoría
Omar Danilo Rivera Barrios
generalidades de administración de desastres
sonia liliana buesaquillo getial
Vulnerabilidad
KELLY JOHANNA GARAVITO MOTTA
Browse Library