Cybersecurity Compliance Framework & System Administration
subject matter experts (SMEs)
Compliance and Industry Standards Summary(ISO/SOC/PCI/HIPAA)
Center for Internet Security (CIS) Critical Security Controls
CIS Controls Implementation Group
Cybersecurity Roles, Processes & Operating System Security
The Information Technology Infrastructure Library (ITIL)
ITIL® 4: the framework for the management of IT-enabled services
how IT Service Management (ITSM) and ITIL are related.
Authentication and Access control
3, (Token, list and log are not)
4,
7(authentication, identification, are not)
for cybersecurity, Which two (2) of below are useful tools used to monitor network access control processes?
Sniffers, Access Control Lists (ACL)
Introduction to cybersecurity tools & cyber attacks
W3
discretionary access control 自主访问控制
National Institute of Standards & Technology
National Initiative For Cybersecurity Education
Computer Security Incident Handling Guide Chapter 2: Organizing a Computer Security Incident Response Capability
Chain of custody
Rainbow tables
Stateful / stateless firewall
W2
Kill chain
reconnaissance, inspection
Gophish, open source phishing framework
social engineering
vishing
inventory, check list
payload, 有效载荷
spoof, cheat
DDOS, swamp
sirens= buzzer
rogue software process = gangster
exfiltration sensitive data 泄露
Quiz
- In order for a network card (NIC) to engage in packet sniffing, it must be running in which mode?