User:Jheijmann/Books/ICT Security Stuff

Several aspects

 * Inleiding
 * Architecture framework
 * Enterprise architecture framework
 * Information
 * Computer
 * Communication
 * Security
 * HVAC


 * 1 Computers
 * Computer hardware
 * Software
 * Operating system
 * Virtual machine
 * Firmware
 * Peripheral
 * Load balancing (computing)
 * Electromagnetic interference


 * 2 Communication
 * Computer network
 * OSI model
 * Lists of network protocols
 * Data transmission
 * Telecommunications network
 * Wide area network
 * Local area network
 * Bandwidth (computing)
 * Internet
 * Data transmission
 * Email
 * Cable


 * 3 ICT Security
 * Human security
 * Physical security
 * Internet security
 * Computer security
 * Application security
 * Data security
 * Communications security
 * Information security
 * Network security
 * Standard RAID levels
 * Computational criminology
 * Cyber security standards


 * 3.1 Threats
 * Threat (computer)
 * Responsibility assignment matrix
 * Vulnerability
 * Hacker
 * Malware
 * Encryption
 * Threat (computer)
 * Malware
 * Hacker
 * Vulnerability
 * Attack (computing)
 * Denial-of-service attack


 * 3.2 Controls - measures - objects
 * Security controls
 * ISO/IEC 27000-series
 * IT Baseline Protection Catalogs
 * Responsibility assignment matrix
 * Training
 * Awareness
 * Classified information
 * Authorisation
 * Authentication
 * Public key certificate
 * Password
 * Honeypot (computing)
 * Common Criteria
 * Encryption
 * Firewall (computing)
 * Intrusion detection system
 * Intrusion prevention system
 * Log analysis
 * Sandbox (computer security)


 * 3.3 Monitoring
 * Business transaction management
 * Application performance management
 * Network monitoring
 * System monitoring
 * Website monitoring


 * 4 Risk Management
 * Risk management
 * IT risk


 * 5 ICT Security Audits
 * Generally Accepted Auditing Standards
 * Government Auditing Standards
 * Audit and Assurance Standards issued by ICAI
 * International Standards on Auditing
 * Penetration test
 * Information technology security audit


 * 6 References - WikiBooks
 * Book:IT Fundamentals
 * Book:Computer Networks
 * Book:Network Security and Management
 * Book:OSI
 * Book:Electronics
 * Book:Internet security
 * Book:Internet Protocol Analysis
 * Book:Malware
 * Book:Quick Guide to Malware
 * Book:Electromagnetism
 * Book:Physics
 * Book:ICSE Physics
 * Book:Complete Algebra Course
 * Book:Mathematics
 * Book:College Mathematics: Algebra
 * Book:Algebraic Mathematics and Logics
 * Book:Mathematical Logic
 * Book:Energy
 * Book:Maxwell's equations
 * Book:Atom Elementary Particles
 * Book:1
 * Book:Quantum Mechanics
 * Book:Natural Science2
 * Book:Topics in Physics and Math
 * Book:Structural Engineering Fundamentals
 * Book:Magnetism Rev 2
 * Book:History of Computers
 * Book:Boolean Logic
 * Book:Quantum Algebra and Quantum Computers
 * Book:An introduction to electronics
 * Book:Fundamentals of Digital Electronics
 * Book:Hoaxes Vol.4
 * Book:Anonymous
 * Book:Radio-Crypto
 * Book:IT Service Management
 * Book:Internet 2015
 * Book:Web browser
 * Book:Jargon of the Dark Web


 * End