Partenaire Premium

CySec Foundations Teil 2

CySec Foundations Teil 2

CySec Foundations Teil 2


Fichier Détails

Cartes-fiches 210
Langue Deutsch
Catégorie Informatique
Niveau Université
Crée / Actualisé 31.07.2020 / 10.08.2020
Attribution de licence Non précisé
Lien de web
https://card2brain.ch/box/20200731_cysec_foundations_teil_2
Intégrer
<iframe src="https://card2brain.ch/box/20200731_cysec_foundations_teil_2/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

Steps of the NIST Cyber Security Framework?

1. Identify

2. Protect

3. Detect

4. Respond

5. Recover

What is technical vulnerability management?

a security practise designed to proactively mitigate or prevent the exploitation of vulnerabilities

Which 4 things does the process of technical vulnerability management involve?

1. Identification

2. classification

3. remediation

4. mitigation

 

of vulnerabilities

What is a security event?

occurrence to have potential security implications

What is a security incident?

occurrence that actually or potentially jeopradizes confidentiality, integrity or availability of information

Sources of security events

- OS logs

- applications logs

- security tool logs

- outbound proxy logs

What does APT stand for?

Advanced Persistent Threat

What is an Advanced Persistent Threat (APT)?

network attack in which unauthorized personell gains access to a network and stays there, undetected for a long time

intention is to steal data

often targets orgs in high-value information sectors