Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

1. Using a Web browser, identify at least five sources you would wan.docx

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité

Consultez-les par la suite

1 sur 1 Publicité

1. Using a Web browser, identify at least five sources you would wan.docx

Télécharger pour lire hors ligne

1. Using a Web browser, identify at least five sources you would want to use when training a CSIRT.

2. Using a Web browser, visit www.mitre.org. What information is provided there, and how would it be useful?

3. Using a Web browser, visit www.securityfocus.com. What is Bugtraq, and how would it be useful? What additional information is provided under the Vulnerabilities tab?

4. Using a Web browser, visit www.cert.org. What information is provided there, and how would it be useful? What additional information is provided at www.cert.org/csirts/?
.

1. Using a Web browser, identify at least five sources you would want to use when training a CSIRT.

2. Using a Web browser, visit www.mitre.org. What information is provided there, and how would it be useful?

3. Using a Web browser, visit www.securityfocus.com. What is Bugtraq, and how would it be useful? What additional information is provided under the Vulnerabilities tab?

4. Using a Web browser, visit www.cert.org. What information is provided there, and how would it be useful? What additional information is provided at www.cert.org/csirts/?
.

Publicité
Publicité

Plus De Contenu Connexe

Plus par carlstromcurtis (20)

Plus récents (20)

Publicité

1. Using a Web browser, identify at least five sources you would wan.docx

  1. 1. 1. Using a Web browser, identify at least five sources you would want to use when training a CSIRT. 2. Using a Web browser, visit www.mitre.org. What information is provided there, and how would it be useful? 3. Using a Web browser, visit www.securityfocus.com. What is Bugtraq, and how would it be useful? What additional information is provided under the Vulnerabilities tab? 4. Using a Web browser, visit www.cert.org. What information is provided there, and how would it be useful? What additional information is provided at www.cert.org/csirts/?

×