Cybersecurity Compliance Framework & System Administration

subject matter experts (SMEs)

SOC

HIPAA

PCI DSS

Compliance and Industry Standards Summary(ISO/SOC/PCI/HIPAA)

Center for Internet Security (CIS) Critical Security Controls

CIS Controls Implementation Group

Cybersecurity Roles, Processes & Operating System Security

The Information Technology Infrastructure Library (ITIL)

ITIL® 4: the framework for the management of IT-enabled services

how IT Service Management (ITSM) and ITIL are related.

Authentication and Access control

3, (Token, list and log are not)

4,

7(authentication, identification, are not)

for cybersecurity, Which two (2) of below are useful tools used to monitor network access control processes?

Sniffers, Access Control Lists (ACL)

Introduction to cybersecurity tools & cyber attacks

W3

non-repudiation

discretionary access control 自主访问控制

Pentest

owasp

National Institute of Standards & Technology

National Initiative For Cybersecurity Education

Computer Security Incident Handling Guide Chapter 2: Organizing a Computer Security Incident Response Capability

digital forensics

Chain of custody

Locard's exchange principle

Rainbow tables

Stateful / stateless firewall

W2

Kill chain

reconnaissance, inspection

phishing

Gophish, open source phishing framework

social engineering

SETtoolkit

vishing

malware

ransomware

inventory, check list

payload, 有效载荷

spoof, cheat

DDOS, swamp

sirens= buzzer

rogue software process = gangster

exfiltration sensitive data 泄露

Quiz

  1. In order for a network card (NIC) to engage in packet sniffing, it must be running in which mode?

Promiscuous mode