![]() |
Cyber Security Landscape
|
|
*** Solution Categories - Data Security *** BlaBlaBlaLine1 BlaBlaBlaLine2 BlaBlaBlaLine3
|
![]() |
| Mapped Buisness Risks | ||||||
| Brand Damage | Data/Secret Loss | Service Disruption | ||||
| Mapped Cyber Risks | ||||||
| Data Security / Loss | Extortion | Human Error | Basic Security Hygiene | Identity/Password Protection | Insider Threat | |
| Mapped Attack Methods | ||||||
| BotNet Attack | Denial Of Service Attack | Business Email Impersonation | Identity Comprimise | Malware Attack | Phishing Attack | |
| Ransomware Attack | Rootkit Attack | Targeted Attack | ||||
| Mapped Mitigation Methods | ||||||
| Limit & Control Access | Protect Data | |||||