Building and Managing an Effective Security Operations Center
Building and Managing an Effective Security Operations Center
Rainey, III, James L.
Taylor & Francis Ltd
01/2025
332
Dura
Inglês
9781138197749
Descrição não disponível.
Roles of Security Operations: IT Security Specialists and Security Analysts. The Role of Forensics and the IT Audit Discipline. Executive Level IT Security Roles. Simulating and Mitigating Threats: Documenting Abstraction and What to Anticipate. Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege (STRIDE). Modeling tools for Threat Analysis. Social Hacking: Never 'Too Much' Information. Disguise. Persuasion. IT Security Operations and Privacy: Protecting Confidential Data. Assessing Impact. IT Security Documentation: Business Impact Assessments. Disaster Recovery Documentation. Technical Aspects of Security Operations: Execution of Network Security Monitoring (NSM) and Audit Logs. Packet Analysis . Defending the Applications, Servers and Clients. Collateral Duties of Security Operations: Policy, Configuration Management, Password Administration and Management, and Proactive Audit Preparation
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Roles of Security Operations: IT Security Specialists and Security Analysts. The Role of Forensics and the IT Audit Discipline. Executive Level IT Security Roles. Simulating and Mitigating Threats: Documenting Abstraction and What to Anticipate. Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege (STRIDE). Modeling tools for Threat Analysis. Social Hacking: Never 'Too Much' Information. Disguise. Persuasion. IT Security Operations and Privacy: Protecting Confidential Data. Assessing Impact. IT Security Documentation: Business Impact Assessments. Disaster Recovery Documentation. Technical Aspects of Security Operations: Execution of Network Security Monitoring (NSM) and Audit Logs. Packet Analysis . Defending the Applications, Servers and Clients. Collateral Duties of Security Operations: Policy, Configuration Management, Password Administration and Management, and Proactive Audit Preparation
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.