Advanced Security: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 4: Line 4:
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
'''Network Segmentation'''
'''Network Segmentation'''
<br>
<br><br>
[[File:network-segmentation.png|frameless|40px|center]]
[[File:network-segmentation.png|frameless|40px|center]]
<br>
<br>
Line 16: Line 16:
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
'''Endpoint Protection'''
'''Endpoint Protection'''
<br>
<br>
<br>
[[File:endpoint-protection.png|frameless|40px|center]]
[[File:endpoint-protection.png|frameless|40px|center]]
Line 29: Line 30:
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" |
'''Vulnerability Management'''
'''Vulnerability Management'''
<br>
<br>
<br>
[[File:vulnerability-management.png|frameless|40px|center]]
[[File:vulnerability-management.png|frameless|40px|center]]
Line 35: Line 37:
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
'''Penetration Testing'''
'''Penetration Testing'''
<br>
<br>
<br>
[[File:penetration-testing.png|frameless|40px|center]]
[[File:penetration-testing.png|frameless|40px|center]]
Line 54: Line 57:
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
'''Change Management'''
'''Change Management'''
<br>
<br>
<br>
[[File:change-management.png|frameless|40px|center]]
[[File:change-management.png|frameless|40px|center]]
Line 60: Line 64:
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" |
'''Identity & Access Management'''
'''Identity & Access Management'''
<br>
<br>
<br>
[[File:identity-access-management.png|frameless|40px|center]]
[[File:identity-access-management.png|frameless|40px|center]]
Line 66: Line 71:
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
'''Patch Management'''
'''Patch Management'''
<br>
<br>
<br>
[[File:patch-management.png|frameless|40px|center]]
[[File:patch-management.png|frameless|40px|center]]

Revision as of 00:32, 7 August 2023

Elephants.png

Network Segmentation


Divide networks into smaller, isolated segments to limit the impact of a potential breach.

Intrusion Detection & Prevention Systems


Deploy advanced systems to detect and prevent network intrusions.

Endpoint Protection


Implement robust antivirus and endpoint security solutions to safeguard individual devices.

Security Information & Event Management


Utilize SIEM tools to monitor and analyze security events across the network.

Vulnerability Management


Conduct regular assessments to identify and address system vulnerabilities.

Penetration Testing


Simulate real-world attacks to evaluate the security of a system or network.

Incident Response Planning


Develop and test an incident response plan to efficiently handle cybersecurity incidents.

Secure Configuration Management


Establish and maintain secure configuration settings for all systems and devices.

Change Management


Implement structured processes to manage changes in a controlled and efficient manner.

Identity & Access Management


Implement proper user access controls, management processes, and regularly review user privileges.

Patch Management


Establish processes to apply patches and updates to systems and applications in a timely manner.

Security Awareness Training & Testing


Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.