Question: Assignment 2 -Ticketing Research Below are some common threats within an on-premise, hosted or cloud computing environment: Data Breach Data Loss Account or Service Hijacking
Assignment 2 -Ticketing Research
Below are some common threats within an on-premise, hosted or cloud computing environment:
Data Breach
Data Loss
Account or Service Hijacking
Insecure Interfaces and APIs
Denial of Service
Malicious Insiders
Shared Technology Vulnerabilities
BYOD and IoE Vulnerabilities
Using your extensive knowledge of data aggregation, created an excel table to identify the following for each threat:
Incident Category
Incident Severity Level
Logging Severity Level
Proposed Log Correlation Rules Table See table 2-3
| Correlation Search | Description | Default |
| EndPoint - Active unmediated Malware Infection | Number days that the device was unable to clean the infection | 3 |
| Endpoint - Anomalous New Service | Number of new services | 9 |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
