Cyber Security Models

These models and simulations have been tagged “Cyber Security”.

Insight diagram
This model represents the Individual-SA and Team-SA of the cyber security environment of vulnerabilities.
Cyber-SA of the Security Environment
Insight diagram
This model represents the cyber security environment of vulnerabilities and exploits to be mitigated through vendor patches AND the organisation capability to apply them.
Cyber security Environment
Insight diagram
This model represents the cyber security environment of vulnerabilities and exploits to be mitigated through vendor patches AND the organisation capability to apply them.
Clone of Cyber security Environment
Insight diagram
Team 6: IoT & Cyber Security on Wind Turbine Generators (WTG)

Team 6:
Sirius G. Quimbo
Estefania Reyes
Celso Alvarado
Ibrahim Abdullah I Alzmmam

IoT & Cyber Security on WTG
Insight diagram
This model represents the Individual-SA and Team-SA of the cyber security environment of vulnerabilities.
Clone of Cyber-SA of the Security Environment
Insight diagram
This model represents the cyber security environment of vulnerabilities and exploits to be mitigated through vendor patches AND the organisation capability to apply them.
Clone of Cyber security Environment
Insight diagram
This model represents the Individual-SA and Team-SA of the cyber security environment of vulnerabilities.
Clone of Clone of Cyber-SA of the Security Environment
Insight diagram
This model represents the Individual-SA and Team-SA of the cyber security environment of vulnerabilities.
Clone of Cyber-SA of the Security Environment
Insight diagram
This model represents the cyber security environment of vulnerabilities and exploits to be mitigated through vendor patches AND the organisation capability to apply them.
Clone of Cyber security Environment
Insight diagram
This model represents the Individual-SA and Team-SA of the cyber security environment of vulnerabilities.
Clone of Cyber-SA of the Security Environment
Insight diagram
DDoS Mitigation System
Insight diagram
This model represents the cyber security environment of vulnerabilities and exploits to be mitigated through vendor patches AND the organisation capability to apply them.
Clone of Clone of Cyber security Environment
Insight diagram
Model simuluje šíření kybernetických útoků v podnikové síti. 
Zahrnuje procesy infekce, detekce, čištění a zpevnění (hardening) 
IT zařízení. Umožňuje analyzovat dopady různých bezpečnostních 
opatření a úrovně hrozeb na celkový stav infrastruktury.
Clone of Šíření kybernetických útoků / malwaru v podnikové síti
Insight diagram
Model simuluje šíření kybernetických útoků v podnikové síti. 
Zahrnuje procesy infekce, detekce, čištění a zpevnění (hardening) 
IT zařízení. Umožňuje analyzovat dopady různých bezpečnostních 
opatření a úrovně hrozeb na celkový stav infrastruktury.
Šíření kybernetických útoků / malwaru v podnikové síti
3 months ago