三叉戟

领域专家的成长记录

用户工具

站点工具


projects:cissp:chapter17

差别

这里会显示出您选择的修订版和当前版本之间的差别。

到此差别页面的链接

两侧同时换到之前的修订记录前一修订版
后一修订版
前一修订版
projects:cissp:chapter17 [2025/05/18 17:20] jackiezprojects:cissp:chapter17 [2025/05/18 17:26] (当前版本) jackiez
行 25: 行 25:
 Understand how to maintain accountability. Accountability is maintained for individual subjects through the use of auditing. Logs record user activity and users can be held accountable for their logged actions. This directly promotes good user behavior and compliance with the organization's security policy. Understand how to maintain accountability. Accountability is maintained for individual subjects through the use of auditing. Logs record user activity and users can be held accountable for their logged actions. This directly promotes good user behavior and compliance with the organization's security policy.
  
 +Describe threat feeds and threat hunting. Threat feeds provide organizations with a steady stream of raw data. By analyzing threat feeds, security administrators can learn of current threats. They can then use this knowledge to search through the network looking for signs of these threats.
 +
 +Know the benefits of SOAR security orchestration, automation, and response technologies automate responses to incidents. One of the primary benefits is that this reduces the workload of administrators.
 +通过让计算机系统响应,它也避免了人为错误的发生。
 +Those are the study essentials that you'll need to know for chapter 17, Preventing and Responding to incidents.
  
projects/cissp/chapter17.1747556433.txt.gz · 最后更改: jackiez