Incident Response, Formal steps to handle security incidents, Preparation, Planning and tools needed before an incident, Detection, Identifying and reporting the incident, Containment, Isolating affected systems to prevent spread, Eradication, Removing malicious components or access, Recovery, Restoring systems to normal operation, Lessons Learned, Reviewing the incident and improving defenses, SIEM, Security Information and Event Management platform, SOAR, Security Orchestration, Automation, and Response platform, Syslog, Logging protocol used for event messages, Log Analysis, Reviewing logs to find anomalies or threats, Penetration Test, Authorized attack simulation to find weaknesses, Vulnerability Scan, Automated scan to identify vulnerabilities, DLP, Data Loss Prevention – protects sensitive data from leaking, Threat Intelligence, Feeds of information about current cyber threats.

Bảng xếp hạng

Xem những người chơi hàng đầu

Bảng xếp hạng

Phong cách trực quan

Tùy chọn

Chuyển đổi mẫu

Bảng xếp hạng

Xem những người chơi hàng đầu
)
Bạn có muốn khôi phục tự động lưu: không?