Network Attacks

Conduct Logging and Monitoring Activities

2020-07-15T12:02:05+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Logging and Monitoring Activities This topic includes the methods or procedures that help to conduct the logging and monitoring activities. Event logging is an essential part of an organization’s IT operations. Intrusion Detection and Prevention These technologies can use to detect and prevent intrusions. The important thing is that both should be used [...]

Understand Requirements for Investigation Types

2020-07-15T12:27:54+00:00Tags: , , , , , , , , , , , |

Understand Requirements for Investigation Types Investigations and incident management must often be conducted simultaneously in a well-coordinated and controlled manner to ensure that the initial actions of either activity don’t destroy evidence or cause further damage to the organization’s assets. In this part of this tutorial, we'll take a look at requirements for investigation [...]

Conduct or Facilitate Security Audits

2020-06-24T12:15:02+00:00Tags: , , , , , , , , , , , , , , |

Conduct or Facilitate Security Audits Security audits should occur on a daily basis according to the policy fixed in place by the organization. Internal auditing normally occurs more frequently than external or third-party auditing. Internal Security auditing should be an ongoing task of the security team. Process of aggregating log data is not very [...]

Analyze Test Output and Generate a Report

2020-07-15T12:31:30+00:00Tags: , , , , , , , , , , , , , , , , , , |

Analyze Test Output and Generate a Report Security experts must be able to analyze log and test data, and report this information in meaningful ways, to senior management teams so they are alert of possible risks or harm, and make informed security decisions. Organizations usually have different levels of management. Security professionals need to [...]

Conduct Security Control Testing- Part 2

2020-07-15T12:45:53+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Security Control Testing- Part 2 This page is dedicated to continuing the Conduct Security Control Testing title. In this part of this tutorial, we'll take a look at control testing to help you understand the different aspects of control testing. You can see the previous section here. Log Reviews Reviewing various security logs [...]

Conduct Security Control Testing- Part 1

2020-07-15T12:43:43+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Security Control Testing- Part 1 One of the most important topics in CISSP course is conduct security control testing. In this part of this tutorial, we'll take a look at control testing to help you understand the different aspects of control testing. Security control testing employs various tools and techniques, including vulnerability assessments, [...]

Manage the Identity and Access Provisioning Lifecycle

2020-07-16T06:41:38+00:00Tags: , , , , , , , , , , , , |

Manage the Identity and Access Provisioning Lifecycle The life cycle consists of the assignment of privileges through roles and designation. The following design, a typical identity and provisioning life cycle consists of these steps: Enrolment of user or create user Determining roles, privileges, and access requirements to systems and applications Provisioning user accounts to [...]

Manage Identification and Authentication

2020-07-16T06:39:28+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Manage Identification and Authentication of People, Devices, and Services In this part of this tutorial, we'll take a look at Manage Identification and Authentication of People, Devices, and Services to help you understand the different aspects of authentication. Identity Management Implementation The core activity within identity and access management (IAM) is the management of [...]

Go to Top