projects:cissp:chapter17
差别
这里会显示出您选择的修订版和当前版本之间的差别。
两侧同时换到之前的修订记录前一修订版后一修订版 | 前一修订版 | ||
projects:cissp:chapter17 [2025/05/18 17:20] – jackiez | projects:cissp:chapter17 [2025/05/18 17:26] (当前版本) – jackiez | ||
---|---|---|---|
行 25: | 行 25: | ||
Understand how to maintain accountability. Accountability is maintained for individual subjects through the use of auditing. Logs record user activity and users can be held accountable for their logged actions. This directly promotes good user behavior and compliance with the organization' | Understand how to maintain accountability. Accountability is maintained for individual subjects through the use of auditing. Logs record user activity and users can be held accountable for their logged actions. This directly promotes good user behavior and compliance with the organization' | ||
+ | Describe threat feeds and threat hunting. Threat feeds provide organizations with a steady stream of raw data. By analyzing threat feeds, security administrators can learn of current threats. They can then use this knowledge to search through the network looking for signs of these threats. | ||
+ | |||
+ | Know the benefits of SOAR security orchestration, | ||
+ | 通过让计算机系统响应,它也避免了人为错误的发生。 | ||
+ | Those are the study essentials that you'll need to know for chapter 17, Preventing and Responding to incidents. | ||
projects/cissp/chapter17.1747556433.txt.gz · 最后更改: 由 jackiez