Skip to content

Commit dd80e75

Browse files
authored
Add files via upload
1 parent 21fc392 commit dd80e75

File tree

5 files changed

+1820
-0
lines changed

5 files changed

+1820
-0
lines changed

d3.min.js

+2
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

index.html

+25
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
<!DOCTYPE html>
2+
<html>
3+
<head>
4+
<meta charset="UTF-8">
5+
<meta name="viewport" content="width=device-width, initial-scale=1.0">
6+
<meta http-equiv="X-UA-Compatible" content="ie=edge">
7+
<title>Cyber Security Domains</title>
8+
<style>
9+
* {
10+
margin: 0;
11+
padding: 0;
12+
}
13+
#mindmap {
14+
display: block;
15+
width: 100vw;
16+
height: 100vh;
17+
}
18+
</style>
19+
<link rel="stylesheet" href="style.css">
20+
</head>
21+
<body>
22+
<svg id="mindmap"></svg>
23+
<script src="d3.min.js"></script><script src="index.js"></script><script src="index2.js"></script><script>(()=>{setTimeout(()=>{const{markmap:x,mm:K}=window,P=new x.Toolbar;P.attach(K);const F=P.render();F.setAttribute("style","position:absolute;bottom:20px;right:20px"),document.body.append(F)})})()</script><script>((b,L,T,D)=>{const H=b();window.mm=H.Markmap.create("svg#mindmap",(L||H.deriveOptions)(D),T)})(()=>window.markmap,null,{"content":"Cyber Security Domains","children":[{"content":"Security Architecture","children":[{"content":"Network Design","children":[{"content":"DDoS Prevention","children":[],"payload":{"tag":"li","lines":"11,12"}}],"payload":{"tag":"h3","lines":"10,11"}},{"content":"Security Engineering","children":[],"payload":{"tag":"h3","lines":"12,13"}},{"content":"Data Protection","children":[{"content":"Data Leakage Prevention","children":[],"payload":{"tag":"li","lines":"14,15"}}],"payload":{"tag":"h3","lines":"13,14"}},{"content":"Access Control","children":[{"content":"Identity Management","children":[{"content":"Privileged Access Management","children":[],"payload":{"tag":"li","lines":"17,18"}},{"content":"Identity &amp; Access Management","children":[],"payload":{"tag":"li","lines":"18,19"}}],"payload":{"tag":"h4","lines":"16,17"}},{"content":"Federated Identity","children":[],"payload":{"tag":"h4","lines":"19,20"}},{"content":"MFA &amp; SSO","children":[],"payload":{"tag":"h4","lines":"20,21"}}],"payload":{"tag":"h3","lines":"15,16"}},{"content":"Cloud Security","children":[],"payload":{"tag":"h3","lines":"21,22"}},{"content":"Secure System Build","children":[{"content":"Baseline Configuration","children":[],"payload":{"tag":"li","lines":"23,24"}},{"content":"Patch Management","children":[],"payload":{"tag":"li","lines":"24,25"}}],"payload":{"tag":"h3","lines":"22,23"}},{"content":"Cryptography","children":[{"content":"Key and Secret Management","children":[{"content":"Vaulting","children":[],"payload":{"tag":"li","lines":"27,28"}},{"content":"HSM","children":[],"payload":{"tag":"li","lines":"28,29"}}],"payload":{"tag":"h4","lines":"26,27"}},{"content":"Encryption Standards","children":[],"payload":{"tag":"h4","lines":"29,30"}},{"content":"Certificate Management","children":[],"payload":{"tag":"h4","lines":"30,31"}}],"payload":{"tag":"h3","lines":"25,26"}},{"content":"Endpoint Hygiene","children":[],"payload":{"tag":"h3","lines":"31,32"}},{"content":"Container Security","children":[],"payload":{"tag":"h3","lines":"32,33"}}],"payload":{"tag":"h2","lines":"9,10"}},{"content":"Security Operations","children":[{"content":"Security Operation Centers","children":[],"payload":{"tag":"h3","lines":"35,36"}},{"content":"Incident Response","children":[{"content":"Breach Notification","children":[],"payload":{"tag":"li","lines":"37,38"}},{"content":"Containment","children":[],"payload":{"tag":"li","lines":"38,39"}},{"content":"Eradication","children":[],"payload":{"tag":"li","lines":"39,40"}},{"content":"Investigation","children":[{"content":"Forensics","children":[],"payload":{"tag":"li","lines":"41,42"}}],"payload":{"tag":"li","lines":"40,42"}}],"payload":{"tag":"h3","lines":"36,37"}},{"content":"Blue Team","children":[],"payload":{"tag":"h3","lines":"42,43"}},{"content":"Red Team","children":[],"payload":{"tag":"h3","lines":"43,44"}},{"content":"Detection","children":[],"payload":{"tag":"h3","lines":"44,45"}},{"content":"SIEM","children":[{"content":"SOAR","children":[],"payload":{"tag":"li","lines":"46,47"}}],"payload":{"tag":"h3","lines":"45,46"}},{"content":"Vulnerability Management","children":[],"payload":{"tag":"h3","lines":"47,48"}},{"content":"Active Defense","children":[],"payload":{"tag":"h3","lines":"48,49"}},{"content":"Threat Hunting","children":[],"payload":{"tag":"h3","lines":"49,50"}}],"payload":{"tag":"h2","lines":"34,35"}},{"content":"Governance","children":[{"content":"Laws and Regulations","children":[{"content":"Regional","children":[{"content":"CCPA","children":[],"payload":{"tag":"li","lines":"54,55"}},{"content":"NYS-DFS 23 NYCRR 500","children":[],"payload":{"tag":"li","lines":"55,56"}}],"payload":{"tag":"h4","lines":"53,54"}},{"content":"Central Government","children":[{"content":"GDPR","children":[],"payload":{"tag":"li","lines":"57,58"}},{"content":"GLBA","children":[],"payload":{"tag":"li","lines":"58,59"}}],"payload":{"tag":"h4","lines":"56,57"}},{"content":"Industry Specific","children":[{"content":"PCI","children":[],"payload":{"tag":"li","lines":"60,61"}},{"content":"HIPAA","children":[],"payload":{"tag":"li","lines":"61,62"}}],"payload":{"tag":"h4","lines":"59,60"}}],"payload":{"tag":"h3","lines":"52,53"}},{"content":"Company's Written Policies","children":[{"content":"Policy","children":[],"payload":{"tag":"li","lines":"63,64"}},{"content":"Procedure","children":[],"payload":{"tag":"li","lines":"64,65"}},{"content":"Standard","children":[],"payload":{"tag":"li","lines":"65,66"}},{"content":"Guideline","children":[],"payload":{"tag":"li","lines":"66,67"}},{"content":"Compliance &amp; Enforcement","children":[],"payload":{"tag":"li","lines":"67,68"}}],"payload":{"tag":"h3","lines":"62,63"}},{"content":"Executive Management Involvement","children":[{"content":"Reports and Scorecards","children":[{"content":"KPIs/KRIs","children":[],"payload":{"tag":"li","lines":"70,71"}}],"payload":{"tag":"h4","lines":"69,70"}},{"content":"Risk Informed","children":[],"payload":{"tag":"h4","lines":"71,72"}}],"payload":{"tag":"h3","lines":"68,69"}}],"payload":{"tag":"h2","lines":"51,52"}},{"content":"Risk Assessment","children":[{"content":"3rd Party Risk","children":[{"content":"4th Party Risk","children":[],"payload":{"tag":"li","lines":"75,76"}}],"payload":{"tag":"h3","lines":"74,75"}},{"content":"Penetration Test","children":[{"content":"Infrastructure (Network and Systems)","children":[],"payload":{"tag":"li","lines":"77,78"}},{"content":"Application Pen Tests","children":[],"payload":{"tag":"li","lines":"78,79"}},{"content":"Social Engineering","children":[],"payload":{"tag":"li","lines":"79,80"}},{"content":"DAST","children":[],"payload":{"tag":"li","lines":"80,81"}}],"payload":{"tag":"h3","lines":"76,77"}},{"content":"Vulnerability Scan","children":[],"payload":{"tag":"h3","lines":"81,82"}},{"content":"Assets Inventory","children":[],"payload":{"tag":"h3","lines":"82,83"}},{"content":"Risk Monitoring Services","children":[{"content":"Risk Score","children":[],"payload":{"tag":"li","lines":"84,86"}}],"payload":{"tag":"h3","lines":"83,84"}}],"payload":{"tag":"h2","lines":"73,74"}},{"content":"User Education","children":[{"content":"Training (new skills)","children":[],"payload":{"tag":"li","lines":"87,88"}},{"content":"Awareness (reinforcement)","children":[],"payload":{"tag":"li","lines":"88,89"}},{"content":"Cybersecurity table-top exercise","children":[],"payload":{"tag":"li","lines":"89,91"}}],"payload":{"tag":"h2","lines":"86,87"}},{"content":"Threat Intelligence","children":[{"content":"Internal","children":[],"payload":{"tag":"h3","lines":"92,93"}},{"content":"IOCs","children":[],"payload":{"tag":"h3","lines":"93,94"}},{"content":"Intel Sharing","children":[{"content":"External","children":[],"payload":{"tag":"h4","lines":"95,96"}},{"content":"Contextual","children":[],"payload":{"tag":"h4","lines":"96,97"}}],"payload":{"tag":"h3","lines":"94,95"}}],"payload":{"tag":"h2","lines":"91,92"}},{"content":"Career Development","children":[{"content":"Training","children":[],"payload":{"tag":"li","lines":"99,100"}},{"content":"Certifications","children":[],"payload":{"tag":"li","lines":"100,101"}},{"content":"Conferences","children":[],"payload":{"tag":"li","lines":"101,102"}},{"content":"Peer Groups","children":[],"payload":{"tag":"li","lines":"102,103"}},{"content":"Self Study","children":[],"payload":{"tag":"li","lines":"103,104"}},{"content":"Coaches and Role Models","children":[],"payload":{"tag":"li","lines":"104,106"}}],"payload":{"tag":"h2","lines":"98,99"}},{"content":"Frameworks and Standards","children":[{"content":"NIST Cybersecurity Framework","children":[],"payload":{"tag":"li","lines":"107,108"}},{"content":"ISO 27001 27017 27018","children":[],"payload":{"tag":"li","lines":"108,109"}},{"content":"OWASP Top 10 (WebApp &amp; API)","children":[],"payload":{"tag":"li","lines":"109,110"}},{"content":"CIS Top 20 Controls","children":[],"payload":{"tag":"li","lines":"110,111"}},{"content":"CIS Benchmarks","children":[],"payload":{"tag":"li","lines":"111,112"}},{"content":"MITRE ATT&amp;CK Framework","children":[],"payload":{"tag":"li","lines":"112,114"}}],"payload":{"tag":"h2","lines":"106,107"}},{"content":"Physical Security","children":[{"content":"IoT Security","children":[],"payload":{"tag":"li","lines":"115,117"}}],"payload":{"tag":"h2","lines":"114,115"}},{"content":"Enterprise Risk Management","children":[{"content":"Lines of Defense","children":[{"content":"Process Owners","children":[],"payload":{"tag":"li","lines":"119,120"}},{"content":"Risk Mgmt Group","children":[],"payload":{"tag":"li","lines":"120,121"}},{"content":"Audit","children":[],"payload":{"tag":"li","lines":"121,122"}}],"payload":{"tag":"h3","lines":"118,119"}},{"content":"Risk Treatment Actions","children":[],"payload":{"tag":"h3","lines":"122,123"}},{"content":"Risk Appetite","children":[],"payload":{"tag":"h3","lines":"123,124"}},{"content":"Cyber Insurance","children":[],"payload":{"tag":"h3","lines":"124,125"}},{"content":"BCP/DR","children":[],"payload":{"tag":"h3","lines":"125,126"}},{"content":"Crisis Management","children":[],"payload":{"tag":"h3","lines":"126,127"}},{"content":"Risk Acceptance Statement","children":[],"payload":{"tag":"h3","lines":"127,128"}},{"content":"Risk Register","children":[],"payload":{"tag":"h3","lines":"128,129"}}],"payload":{"tag":"h2","lines":"117,118"}},{"content":"Application Security","children":[{"content":"S-SDLC","children":[{"content":"\"Shift Left\"","children":[{"content":"CI/CD Integration","children":[],"payload":{"tag":"li","lines":"133,134"}}],"payload":{"tag":"h4","lines":"132,133"}}],"payload":{"tag":"h3","lines":"131,132"}},{"content":"Source Code Scan","children":[{"content":"Open Source Scan","children":[],"payload":{"tag":"li","lines":"135,136"}},{"content":"SAST","children":[],"payload":{"tag":"li","lines":"136,137"}}],"payload":{"tag":"h3","lines":"134,135"}},{"content":"Data-Flow Diagram","children":[],"payload":{"tag":"h3","lines":"137,138"}},{"content":"API Security","children":[],"payload":{"tag":"h3","lines":"138,139"}},{"content":"Security UX","children":[],"payload":{"tag":"h3","lines":"139,140"}},{"content":"Security QA","children":[],"payload":{"tag":"h3","lines":"140,141"}}],"payload":{"tag":"h2","lines":"130,131"}}]},{"colorFreezeLevel":2})</script>
24+
</body>
25+
</html>

0 commit comments

Comments
 (0)