Help

Category:Security Continuous Monitoring (DE.CM)

From GCA ACT
Jump to navigationJump to search

Subcategories

This category has the following 8 subcategories, out of 8 total.

D

  • DE.CM-1: The network is monitored to detect potential cybersecurity events‎ (1 P)
  • DE.CM-2: The physical environment is monitored to detect potential cybersecurity events‎ (1 P)
  • DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events‎ (1 P)
  • DE.CM-4: Malicious code is detected‎ (1 P)
  • DE.CM-5: Unauthorized mobile code is detected‎ (1 P)
  • DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events‎ (1 P)
  • DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed‎ (1 P)
  • DE.CM-8: Vulnerability scans are performed‎ (1 P)
Retrieved from ‘https://act.gcai.dev/index.php?title=Category:Security_Continuous_Monitoring_(DE.CM)&oldid=4554’
Category:
  • DETECT (DE)

Navigation menu

Page actions

  • Category
  • Discussion
  • Read
  • View source
  • History

Page actions

  • Category
  • Discussion
  • More
  • Tools

Personal tools

  • Create account
  • Log in

Navigation

  • ACT Home
  • Safe Shopping Guide
  • Find Your Community
  • Find Tools
  • Report Cybercrime
  • Top Threats
  • Enhanced Protection
  • Advanced Security
  • Get Help
  • GET INVOLVED
  • Terms of Use
  • UCoC
  • Disclaimers
  • Privacy Policy
  • Help about MediaWiki

Tools

  • What links here
  • Related changes
  • Special pages
  • Printable version
  • Permanent link
  • Page information
  • Browse properties
Powered by MediaWikiPowered by BlueSpicePowered by Semantic MediaWiki
  • This page was last modified on 23 October 2023, at 03:25.
  • Privacy policy
  • About GCA ACT
  • Disclaimers