Question: Assignment 2 -Ticketing Research Below are some common threats within an on-premise, hosted or cloud computing environment: Data Breach Data Loss Account or Service Hijacking

Assignment 2 -Ticketing Research

Below are some common threats within an on-premise, hosted or cloud computing environment:

Data Breach

Data Loss

Account or Service Hijacking

Insecure Interfaces and APIs

Denial of Service

Malicious Insiders

Shared Technology Vulnerabilities

BYOD and IoE Vulnerabilities

Using your extensive knowledge of data aggregation, created an excel table to identify the following for each threat:

Incident Category

Incident Severity Level

Logging Severity Level

Proposed Log Correlation Rules Table See table 2-3

Correlation Search Description Default

EndPoint - Active unmediated

Malware Infection

Number days that the device was unable to clean the infection 3
Endpoint - Anomalous New Service Number of new services 9

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!