A security engineer is responsible for monitoring company software, firmware, system OS, and applications for known vulnerabilities. How should they stay current on exploits and information security?
The CSIRT discovers that an attacker changed some non-encrypted values on a database, causing an e-commerce application to show incorrect prices. Which part(s) of the CIA Triad was affected on the database?
What identifies the value of data to an organization so that confidentiality and integrity can be protected and intelligent data handling decisions can be made?
An organization has a policy to respond "ASAP" to security incidents. The security team is having a difficult time prioritizing events because they are responding to all of them, in order of receipt. Which part of the IRP does the team need to implement or update?