Advanced Security: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Blanked the page) Tag: Blanking |
No edit summary |
||
Line 1: | Line 1: | ||
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;" | |||
|- | |||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Network Segmentation</div> <div style="padding: 5px;">[[File:network-segmentation.png|frameless|60px|center]]</div> | |||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Intrusion Protection</div> <div style="padding: 5px;">[[File:intrusion-protection.png|frameless|60px|center]]</div> | |||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Endpoint Protection</div> <div style="padding: 5px;">[[File:endpoint-protection.png|frameless|60px|center]]</div> | |||
|- | |||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Security Event Management</div> <div style="padding: 5px;">[[File:security-information-event-management.png|frameless|60px|center]]</div> | |||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Vulnerability Management</div> <div style="padding: 5px;">[[File:vulnerability-management.png|frameless|60px|center]]</div> | |||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Penetration Testing</div> <div style="padding: 5px;">[[File:penetration-testing.png|frameless|60px|center]]</div> | |||
|- | |||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Incident Response</div> <div style="padding: 5px;">[[File:incident-response.png|frameless|60px|center]]</div> | |||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Configuration Management</div> <div style="padding: 5px;">[[File:configuration-management.png|frameless|60px|center]]</div> | |||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Change Management</div> <div style="padding: 5px;">[[File:change-management.png|frameless|60px|center]]</div> | |||
|- | |||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Identity & Access Management</div> <div style="padding: 5px;">[[File:identity-access-management.png|frameless|60px|center]]</div> | |||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Patch Management</div> <div style="padding: 5px;">[[File:patch-management.png|frameless|60px|center]]</div> | |||
| style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | <div style="position:relative; text-align:center; font-weight:bold; z-index: 1;">Security Awareness</div> <div style="padding: 5px;">[[File:security-awareness.png|frameless|60px|center]]</div> | |||
|} |
Revision as of 23:20, 16 July 2023
Network Segmentation
|
Intrusion Protection
|
Endpoint Protection
|
Security Event Management
|
Vulnerability Management
|
Penetration Testing
|
Incident Response
|
Configuration Management
|
Change Management
|
Identity & Access Management
|
Patch Management
|
Security Awareness
|