Forum

taichi
@taichi
Member
Joined: Apr 19, 2020
Last seen: Jan 22, 2023
Topics: 67 / Replies: 41
Reply
RE: Microsoft 365 Certified: Security Administrator Associate - Knowledge Check

1. All of these are identity management capabilities of Microsoft 365 except: Conditional access B2BAutomated investigation and response . V Auto...

4 years ago
Forum
Reply
RE: Office 365 Security Features

2. Office 365 Security & Compliance Alerts, Classification, Data Loss Prevention, Records management, Information governance, Threat managem...

4 years ago
Forum
Reply
RE: Threat Catalog

3. HITRUST - Threat Catalogue Download ID Type Category Sub-Category Threat Description Logical Threats Intentional Conflict...

4 years ago
Reply
RE: Canadian Privacy Laws

OPS Privacy Breach Protocol - from ipc.on.ca (Information and Privacy Commissioner of Ontario) Privacy breach protocol The IPC strongly re...

4 years ago
Reply
RE: What Is Governance & CyberSecurity Governance?

Governance: Goals Policies & Standards Policy Lifecycle Management Risk Management: Risk Assessment Risk Evaluation Risk Monitoring...

4 years ago
Forum
Reply
RE: What Is Governance?

The ComplianceForge Integrated Cybersecurity Governance Model™ (ICGM) takes a comprehensive view towards governing a cybersecurity and privacy program...

4 years ago
Forum
Reply
RE: What Is Governance?

In general, governance is the set of responsibilities and practices exercised by those responsible for an enterprise (e.g., the board and executive ma...

4 years ago
Forum
Reply
RE: Threats and Vulnerabilities List

Information security vulnerabilities are weaknesses that expose an organization to risk. Understanding your vulnerabilities is the first step to manag...

4 years ago
Reply
RE: Threats and Vulnerabilities List

Information Technology Threats and VulnerabilitiesAudience: anyone requesting, conducting or participating in an IT risk assessment. Introduction A ...

4 years ago
Reply
RE: The NIST Model for Vulnerability Management

As described by NIST, vulnerability scanning is a technique used to identify hosts/host attributes and associated vulnerabilities. (Source) NIST sugge...

4 years ago
Forum
Reply
RE: Relation between Vulnerability, Threat and Risk

Risk = Asset x Vulnerability x Threat x Possibility

4 years ago
Forum
Reply
RE: What is Jira

Issues A Jira 'issue' refers to a single work item of any type or size that is tracked from creation to completion. For example, an issue could be a ...

4 years ago
Reply
RE: Threat Modeling: 12 Available Methods

What Are Some Modeling Methods? • Whiteboard diagrams • Brainstorming • Structured (“formal”) diagrams – Data flow diagrams – Swim lanes – State machi...

4 years ago
Reply
RE: Harmonized Threat and Risk Assessment (TRA) Methodology ( CSE-RCMP)

Harmonized Threat and Risk Assessment RiskView H-TRA solution automates the Government of Canada Harmonized Threat and Risk Assessment model ...

4 years ago
Reply
RE: Cloud SQL 'Hello World' Tutorial

Type 'help;' or '\h' for help. Type '\c' to clear the current input statement. mysql> sql CREATE DATABASE geography; USE geography; CREATE TABLE...

4 years ago
Forum
GCP
Page 2 / 3 Prev Next