Advanced Security: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Tag: Reverted
Line 12: Line 12:
<br>
<br>
[[File:intrusion-protection.png|frameless|40px|center]]
[[File:intrusion-protection.png|frameless|40px|center]]
<br>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Deploy advanced systems to detect and prevent network intrusions.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Deploy advanced systems to detect and prevent network intrusions.</div>
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
Line 19: Line 18:
<br>
<br>
[[File:endpoint-protection.png|frameless|40px|center]]
[[File:endpoint-protection.png|frameless|40px|center]]
<br>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Implement robust antivirus and endpoint security solutions to safeguard individual devices.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Implement robust antivirus and endpoint security solutions to safeguard individual devices.</div>
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
Line 25: Line 23:
<br>
<br>
[[File:security-information-event-management.png|frameless|40px|center]]
[[File:security-information-event-management.png|frameless|40px|center]]
<br>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Utilize SIEM tools to monitor and analyze security events across the network.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Utilize SIEM tools to monitor and analyze security events across the network.</div>
|-
|-
Line 32: Line 29:
<br>
<br>
[[File:vulnerability-management.png|frameless|40px|center]]
[[File:vulnerability-management.png|frameless|40px|center]]
<br>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Conduct regular assessments to identify and address system vulnerabilities.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Conduct regular assessments to identify and address system vulnerabilities.</div>
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
Line 45: Line 41:
<br>
<br>
[[File:incident-response.png|frameless|40px|center]]
[[File:incident-response.png|frameless|40px|center]]
<br>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Develop and test an incident response plan to efficiently handle cybersecurity incidents.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Develop and test an incident response plan to efficiently handle cybersecurity incidents.</div>
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
Line 51: Line 46:
<br>
<br>
[[File:configuration-management.png|frameless|40px|center]]
[[File:configuration-management.png|frameless|40px|center]]
<br>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Establish and maintain secure configuration settings for all systems and devices.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Establish and maintain secure configuration settings for all systems and devices.</div>
|-
|-
Line 59: Line 53:
<br>
<br>
[[File:change-management.png|frameless|40px|center]]
[[File:change-management.png|frameless|40px|center]]
<br>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Implement structured processes to manage changes in a controlled and efficient manner.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Implement structured processes to manage changes in a controlled and efficient manner.</div>
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
Line 65: Line 58:
<br>
<br>
[[File:identity-access-management.png|frameless|40px|center]]
[[File:identity-access-management.png|frameless|40px|center]]
<br>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Implement proper user access controls, management processes, and regularly review user privileges.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Implement proper user access controls, management processes, and regularly review user privileges.</div>
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
Line 72: Line 64:
<br>
<br>
[[File:patch-management.png|frameless|40px|center]]
[[File:patch-management.png|frameless|40px|center]]
<br>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Establish processes to apply patches and updates to systems and applications in a timely manner.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Establish processes to apply patches and updates to systems and applications in a timely manner.</div>
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
Line 78: Line 69:
<br>
<br>
[[File:security-awareness.png|frameless|40px|center]]
[[File:security-awareness.png|frameless|40px|center]]
<br>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.</div>
|}
|}

Revision as of 00:47, 7 August 2023

Elephants.png

Network Segmentation


Divide networks into smaller, isolated segments to limit the impact of a potential breach.

Intrusion Detection & Prevention Systems

Deploy advanced systems to detect and prevent network intrusions.

Endpoint Protection

Implement robust antivirus and endpoint security solutions to safeguard individual devices.

Security Information & Event Management

Utilize SIEM tools to monitor and analyze security events across the network.

Vulnerability Management

Conduct regular assessments to identify and address system vulnerabilities.

Penetration Testing


Simulate real-world attacks to evaluate the security of a system or network.

Incident Response Planning

Develop and test an incident response plan to efficiently handle cybersecurity incidents.

Secure Configuration Management

Establish and maintain secure configuration settings for all systems and devices.

Change Management

Implement structured processes to manage changes in a controlled and efficient manner.

Identity & Access Management

Implement proper user access controls, management processes, and regularly review user privileges.

Patch Management

Establish processes to apply patches and updates to systems and applications in a timely manner.

Security Awareness Training & Testing

Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.