monitor

5 Step of Incident Response

Five Step of Incident Response

Incident response may be a process, not an isolated event. so as for incident response to achieve success , teams should take a coordinated and arranged approach to any incident. There are five important steps that each response program should cover so as to effectively address the wide selection of security incidents that a corporation could experience. 1. PREPARATION Preparation is that the key to effective incident response. Even the simplest incident response team cannot …

Five Step of Incident Response Read More »

ISO-27001-Annex-A.15.2-Supplier-Service-Delivery-Management

ISO 27001 Annex : A.15.2 Supplier Service Delivery Management

ISO 27001 Annex : A.15.2 Supplier Service Delivery Management It’s objective is to maintain, in compliance with supplier agreements, an agreed level of information security and delivery of service. A.15.2.1  Monitoring and Review of Supplier Services Control- Organizations shall monitor, review and audit the provision of service to suppliers on a regular basis. Implementation Guidance – Monitoring and review of supplier services will ensure respect for the terms and conditions of information security of the …

ISO 27001 Annex : A.15.2 Supplier Service Delivery Management Read More »

computer-forensic-investigation

Collect Physical Evidence in computer forensic investigation

The victim computer and its elements are vital evidence sources in a computer forensic investigation. Collect all the electronic devices or any other media found at the crime scene. Seize storage devices like hard drives, memory cards, and removable media as they can have stored information. Handheld devices like smart phones, mobile phones, PDAs, digital multimedia devices, and GPS receivers can have valuable evidence information like Internet browsing history, e-mails, chat logs and friend lists, …

Collect Physical Evidence in computer forensic investigation Read More »

10-steps-to-cyber-security

10 Steps to Cyber Security

10 steps to cybersecurity During this blog, we explain and provide advice on the way to start Risk management regime, Secure configuration, Home and mobile working, Incident management, Malware prevention, Managing user privileges, Monitoring, Network security, etc… Related Product: Certified Ethical Hacker | CEH Certification 10 steps to cyber security is a part Certified Ethical Hacking v10(CEH v10) training you learn the cyber security attacks and their impact. As technology continues to evolve so also …

10 Steps to Cyber Security Read More »