Cybersecurity Category
Security Operations
Operational security concepts such as logging, monitoring, patching, backups, and hardening.
an asset inventory
A practical list of devices, accounts, systems, services, and data locations the business relies on.
a backup
A protected copy of important data that can support recovery after loss or attack.
change management
Controlling and recording technical changes so they do not create avoidable risk.
endpoint protection
Security protection for laptops, desktops, and servers against suspicious activity or malware.
logging
Records of system, account, and security events used for monitoring and investigation.
patch management
Keeping software, devices, and systems updated to reduce known weaknesses.
secure configuration
Setting systems up safely instead of relying on risky defaults.
security monitoring
Watching logs, alerts, and system activity for signs of risk or attack.