![]() |
Cyber Security Landscape
|
*** Solution Categories - Logs Mgt *** BlaBlaBlaLine1 BlaBlaBlaLine2 BlaBlaBlaLine3
|
![]() |
Mapped Buisness Risks | ||||||
Brand Damage | Data/Secret Loss | Service Disruption |
Mapped Cyber Risks | ||||||
Data Security / Loss | Extortion | Human Error | Basic Security Hygiene | Identity/Password Protection | Insider Threat |
Mapped Attack Methods | ||||||
BotNet Attack | Denial Of Service Attack | Business Email Impersonation | Identity Comprimise | Malware Attack | Phishing Attack | |
Ransomware Attack | Rootkit Attack | Targeted Attack |
Mapped Mitigation Methods | ||||||
Limit & Control Access | Protect Data | Manage Identities & Passwords | Block Threats & Attacks | Manage Threats & Vulnerabilities | Enable Visibility |
Mapped Functions | ||||||
Automated Security Controls Testing | Logging Agent | Log Collector |