What Vulnerabilities are to Vulnerability Management,
Threats are to Threat Management,
Risks are to Risk Management,
Patches are to Patch Management,
Use Cases are to Detection Engineering,
Malwares are to AV,
Controls are to Compliance,
Incidents are to Incident Response,
Identities are to Identity Management,
Certificates are to PKI,
Rules are to Firewalls/IPS/IDS,
Test Cases are to Penetration Testing,
Clauses are to Framework,
Policies are to Governance.Happy Learning !!
VulnerabilityManagement Cybersecurity
No comments:
Post a Comment