ITperfection

Implement and Support Patch and Vulnerability Management

2020-06-24T05:28:17+00:00Tags: , , , , , , , , , , , , , , |

Implement and Support Patch and Vulnerability Management Patch and vulnerability management is the process of regularly assessing, testing, installing and verifying fixes and patches for software bugs and flaws as they are discovered. Some of software bugs and flaws are security vulnerabilities that could permit an attacker to control a target system and at result [...]

Operate and Maintain Detective and Preventative Measures

2020-07-15T12:11:44+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , |

Operate and Maintain Detective and Preventative Measures These days, one of the most important aspects of cyber security is operate and maintain detective and also preventative measures. In this part of this tutorial, we'll take a look at operate and maintain detective and also preventative measures to help you understand the different aspects of [...]

Conduct Incident Management

2020-07-15T11:59:03+00:00Tags: , , , , , , , , , , , , , , |

Conduct Incident Management In this section, we will discuss about the management of incidents that are potentially damaging to an organization. All incident management models have some common basic characteristics: They all require to identify the event They analyze event to determine the appropriate counteractions They correct the problems They attempt to prevent event [...]

Apply Resource Protection Techniques

2020-07-15T11:46:43+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , |

Apply Resource Protection Techniques One of the important aspects of cyber security is resources protection techniques. In this part of this tutorial, we'll take a look at resources protection techniques to help you understand the different aspects of resources protection.. We will look at some tips for managing media and use asset management for [...]

Conduct Logging and Monitoring Activities

2020-07-15T12:02:05+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Logging and Monitoring Activities This topic includes the methods or procedures that help to conduct the logging and monitoring activities. Event logging is an essential part of an organization’s IT operations. Intrusion Detection and Prevention These technologies can use to detect and prevent intrusions. The important thing is that both should be used [...]

Conduct or Facilitate Security Audits

2020-06-24T12:15:02+00:00Tags: , , , , , , , , , , , , , , |

Conduct or Facilitate Security Audits Security audits should occur on a daily basis according to the policy fixed in place by the organization. Internal auditing normally occurs more frequently than external or third-party auditing. Internal Security auditing should be an ongoing task of the security team. Process of aggregating log data is not very [...]

Analyze Test Output and Generate a Report

2020-07-15T12:31:30+00:00Tags: , , , , , , , , , , , , , , , , , , |

Analyze Test Output and Generate a Report Security experts must be able to analyze log and test data, and report this information in meaningful ways, to senior management teams so they are alert of possible risks or harm, and make informed security decisions. Organizations usually have different levels of management. Security professionals need to [...]

Conduct Security Control Testing- Part 2

2020-07-15T12:45:53+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Security Control Testing- Part 2 This page is dedicated to continuing the Conduct Security Control Testing title. In this part of this tutorial, we'll take a look at control testing to help you understand the different aspects of control testing. You can see the previous section here. Log Reviews Reviewing various security logs [...]

Go to Top