Advanced Security: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 4: | Line 4: | ||
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" | | | style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" | | ||
'''Network Segmentation''' | '''Network Segmentation''' | ||
<br> | <br><br> | ||
[[File:network-segmentation.png|frameless|40px|center]] | [[File:network-segmentation.png|frameless|40px|center]] | ||
<br> | <br> | ||
Line 16: | Line 16: | ||
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" | | | style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" | | ||
'''Endpoint Protection''' | '''Endpoint Protection''' | ||
<br> | |||
<br> | <br> | ||
[[File:endpoint-protection.png|frameless|40px|center]] | [[File:endpoint-protection.png|frameless|40px|center]] | ||
Line 29: | Line 30: | ||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" | | | style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" | | ||
'''Vulnerability Management''' | '''Vulnerability Management''' | ||
<br> | |||
<br> | <br> | ||
[[File:vulnerability-management.png|frameless|40px|center]] | [[File:vulnerability-management.png|frameless|40px|center]] | ||
Line 35: | Line 37: | ||
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" | | | style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" | | ||
'''Penetration Testing''' | '''Penetration Testing''' | ||
<br> | |||
<br> | <br> | ||
[[File:penetration-testing.png|frameless|40px|center]] | [[File:penetration-testing.png|frameless|40px|center]] | ||
Line 54: | Line 57: | ||
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" | | | style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" | | ||
'''Change Management''' | '''Change Management''' | ||
<br> | |||
<br> | <br> | ||
[[File:change-management.png|frameless|40px|center]] | [[File:change-management.png|frameless|40px|center]] | ||
Line 60: | Line 64: | ||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" | | | style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" | | ||
'''Identity & Access Management''' | '''Identity & Access Management''' | ||
<br> | |||
<br> | <br> | ||
[[File:identity-access-management.png|frameless|40px|center]] | [[File:identity-access-management.png|frameless|40px|center]] | ||
Line 66: | Line 71: | ||
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" | | | style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" | | ||
'''Patch Management''' | '''Patch Management''' | ||
<br> | |||
<br> | <br> | ||
[[File:patch-management.png|frameless|40px|center]] | [[File:patch-management.png|frameless|40px|center]] |
Revision as of 00:32, 7 August 2023
Network Segmentation
Divide networks into smaller, isolated segments to limit the impact of a potential breach.
|
Intrusion Detection & Prevention Systems
Deploy advanced systems to detect and prevent network intrusions.
|
Endpoint Protection
Implement robust antivirus and endpoint security solutions to safeguard individual devices.
|
Security Information & Event Management
Utilize SIEM tools to monitor and analyze security events across the network.
| |
Vulnerability Management
Conduct regular assessments to identify and address system vulnerabilities.
|
Penetration Testing
Simulate real-world attacks to evaluate the security of a system or network.
|
Incident Response Planning
Develop and test an incident response plan to efficiently handle cybersecurity incidents.
|
Secure Configuration Management
Establish and maintain secure configuration settings for all systems and devices.
| |
Change Management
Implement structured processes to manage changes in a controlled and efficient manner.
|
Identity & Access Management
Implement proper user access controls, management processes, and regularly review user privileges.
|
Patch Management
Establish processes to apply patches and updates to systems and applications in a timely manner.
|
Security Awareness Training & Testing
Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.
|