Security/InfoSec: Difference between revisions

m
no edit summary
mNo edit summary
Line 23: Line 23:
* Network security
* Network security
* Risk analysis
* Risk analysis
* Policy development and compliance
* Controls, practices, standards development and checking conformance to these


=== Contacts ===
=== Contacts ===
Line 70: Line 70:
* Query a pool of endpoints to verify the presence of a specific indicators
* Query a pool of endpoints to verify the presence of a specific indicators
* Provide response mechanisms to lock down compromised endpoints
* Provide response mechanisms to lock down compromised endpoints
* Periodically verify endpoint's compliance with the security requirements
* Periodically verify endpoint's conformance with the security requirements


==== Audisp-json: System Auditing ====
==== Audisp-json: System Auditing ====
Confirmed users
502

edits