Advanced Security: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
|-
|-
| colspan="3" style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">[[File:Elephants.png|frameless|225px|center|link=Advanced_Protection]]</div>
| colspan="3" style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | [[File:Elephants.png|frameless|225px|left|link=Advanced_Protection]]
|-
|-
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Network Segmentation</div> <div style="padding: 5px;">[[File:network-segmentation.png|frameless|60px|center]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Network Segmentation</div> <div style="padding: 5px;">[[File:network-segmentation.png|frameless|60px|left]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Intrusion Protection</div> <div style="padding: 5px;">[[File:intrusion-protection.png|frameless|60px|center]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Intrusion Protection</div> <div style="padding: 5px;">[[File:intrusion-protection.png|frameless|60px|left]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Endpoint Protection</div> <div style="padding: 5px;">[[File:endpoint-protection.png|frameless|60px|center]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Endpoint Protection</div> <div style="padding: 5px;">[[File:endpoint-protection.png|frameless|60px|left]]</div>
|-
|-
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Security Event Management</div> <div style="padding: 5px;">[[File:security-information-event-management.png|frameless|60px|center]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Security Event Management</div> <div style="padding: 5px;">[[File:security-information-event-management.png|frameless|60px|left]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Vulnerability Management</div> <div style="padding: 5px;">[[File:vulnerability-management.png|frameless|60px|center]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Vulnerability Management</div> <div style="padding: 5px;">[[File:vulnerability-management.png|frameless|60px|left]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Penetration Testing</div> <div style="padding: 5px;">[[File:penetration-testing.png|frameless|60px|center]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Penetration Testing</div> <div style="padding: 5px;">[[File:penetration-testing.png|frameless|60px|left]]</div>
|-
|-
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Incident Response</div> <div style="padding: 5px;">[[File:incident-response.png|frameless|60px|center]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Incident Response</div> <div style="padding: 5px;">[[File:incident-response.png|frameless|60px|left]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Configuration Management</div> <div style="padding: 5px;">[[File:configuration-management.png|frameless|60px|center]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Configuration Management</div> <div style="padding: 5px;">[[File:configuration-management.png|frameless|60px|left]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Change Management</div> <div style="padding: 5px;">[[File:change-management.png|frameless|60px|center]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Change Management</div> <div style="padding: 5px;">[[File:change-management.png|frameless|60px|left]]</div>
|-
|-
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Identity & Access Management</div> <div style="padding: 5px;">[[File:identity-access-management.png|frameless|60px|center]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Identity & Access Management</div> <div style="padding: 5px;">[[File:identity-access-management.png|frameless|60px|left]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Patch Management</div> <div style="padding: 5px;">[[File:patch-management.png|frameless|60px|center]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Patch Management</div> <div style="padding: 5px;">[[File:patch-management.png|frameless|60px|left]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Security Awareness</div> <div style="padding: 5px;">[[File:security-awareness.png|frameless|60px|center]]</div>
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Security Awareness</div> <div style="padding: 5px;">[[File:security-awareness.png|frameless|60px|left]]</div>
|}
|}

Revision as of 23:42, 16 July 2023

Elephants.png
Network Segmentation
Intrusion Protection
Endpoint Protection
Security Event Management
Vulnerability Management
Penetration Testing
Incident Response
Configuration Management
Change Management
Identity & Access Management
Patch Management
Security Awareness