-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Microsoft Cybersecurity Architect Exam Ref SC-100
By :

The life cycle of managing an incident response can be viewed as a tiered approach. The more prepared security operations are for identifying and responding to threats, the lower the impact on the business from a financial, personal, and reputational perspective.
Figure 3.13 shows the tiers of the various security operations functions:
Figure 3.13 – Security operations functional tiers
As shown in Figure 3.13, automation in the workflow is important to managing the efficiency of a security operations team. The more automated responses that can be put in place for well-known attacks, such as phishing-based URLs, SQL injection attacks, brute-force identity attacks, or port scans, can use solutions. An example would be a Web Application Firewall (WAF), which protects against SQL injections, or Microsoft Defender for Office 365, which protects against phishing. Another...
Change the font size
Change margin width
Change background colour