Writing Assignment: Module 04 Real-World Flashcards

1
Q

Do a Web search to identify at least five sources of information you would want to use when training a CSIRT.

A

https://www.cbtnuggets.com/blog/certifications/security/incident-response-how-to-form-a-response-team

https://www.halock.com/incident-readiness/first-responder-training/

https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/

https://www.itgovernanceusa.com/federal-cybersecurity-and-privacy-laws

https://www.logsign.com/blog/what-is-csirt-what-are-csirt-roles-and-responsibilities/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Visit www.mitre.org. What information is provided there, and how would it be useful?

A

It’s an advance national security site. on this site you can learn more about your field be that cyber defense or homeland security. this site is a resources to lean more and to get a better understanding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Visit www.securityfocus.com. What is Bugtraq, and how would it be useful? What additional information is provided under the Vulnerabilities tab?

A

BugTraq is a full disclosure mailing list for the detailed discussion and announcement of computer security vulnerabilities. BugTraq serves as the cornerstone of the Internet-wide security community.

there is no Vulnerabilities tab.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Visit www.cert.org. What information is provided there, and how would it be useful? What additional information is provided at www.cert.org/csirts/?

A

CERT experts are a diverse group of researchers, software engineers, security analysts, and digital intelligence specialists working together to research security vulnerabilities in software products, contribute to long-term changes in networked systems, and develop cutting-edge information and training to improve the practice of cybersecurity.

www.cert.org/csirts/
The CERT Division is a leader in cybersecurity. We partner with government, industry, law enforcement, and academia to improve the security and resilience of computer systems and networks. We study problems that have widespread cybersecurity implications and develop advanced methods and tools to counter large-scale, sophisticated cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Do a Web search for other methods employed by industry or government to share information on possible incidents.

A

https://www.wilderssecurity.com/

https://malwaretips.com/

https://www.antionline.com/

https://forums.comodo.com/

https://www.bleepingcomputer.com/forums/

https://community.spiceworks.com/

https://www.defencetalk.com/military/forums/cybersecurity.63/

https://hacklido.com/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly