Cyber Security Notes
Cyber Security Notes
Cybersecurity
Lifecycle Stage Description Tools and Skills Used
Identify and catalog all assets within - Nessus, Qualys, OpenVAS, Rapid7 Nexpose, Tenable.io
1. Asset Discovery the organization, including devices, (Vulnerability Assessment) - Darktrace (Network Traffic
and Inventory applications, and data repositories. Analysis)
Assess and prioritize security
2. Vulnerability vulnerabilities across the - Nessus, Qualys, OpenVAS, Rapid7 Nexpose, Tenable.io
Management organization's IT infrastructure. (Vulnerability Assessment)
- Splunk, IBM QRadar, ELK (SIEM) - Snort, Suricata
Monitor network and endpoint (IDS/IPS) - CrowdStrike, Carbon Black, Symantec Endpoint
activity to detect signs of potential Protection (Endpoint Security and EDR) - Darktrace
3. Threat Detection security threats and intrusions. (Network Traffic Analysis)
- Splunk, IBM QRadar, ELK (SIEM) - CrowdStrike, Carbon
Investigate and respond to security Black, Symantec Endpoint Protection (Endpoint Security
incidents in a timely manner to and EDR) - Wireshark, Darktrace (Network Traffic
4. Incident Response mitigate potential damage. Analysis)
Gather and analyze information about
emerging cyber threats, - ThreatConnect, Recorded Future, MISP (Threat
5. Threat Intelligence vulnerabilities, and attack techniques. Intelligence)
Manage user identities and control
6. Access Control and access to resources to prevent - AWS, LDAP, Okta (Authentication and Identity
Identity Management unauthorized access. Management)
Implement security best practices and
7. Secure guidelines during the software
Development development lifecycle. - OWASP Top 10 (Secure Development)
Ensure adherence to regulatory - Splunk, IBM QRadar, ELK (SIEM) - Nessus, Qualys,
8. Compliance and requirements and industry standards, OpenVAS, Rapid7 Nexpose, Tenable.io (Vulnerability
Reporting and generate compliance reports. Assessment)