Pular para o conteúdo principal

Compartilhe

INVESTIGAÇÃO DIGITAL: QUANDO OS DADOS FALAM

🔎 INVESTIGAÇÃO DIGITAL: QUANDO OS DADOS FALAM Na superfície, era só mais um caso. Um notebook apreendido. Um smartphone aparentemente limpo. Histórico apagado. Nenhuma evidência visível. Mas, na investigação digital… ausência de dados também é um dado. O perito iniciou a análise com um princípio básico: preservação da cadeia de custódia . Disco clonado. Hash MD5/SHA256 gerado. Ambiente isolado. Nada seria alterado. A máquina original permaneceu intacta. A verdade começava na cópia. 🧠 PRIMEIRA CAMADA: ARTEFATOS DO SISTEMA O sistema parecia limpo… mas não estava. Nos diretórios internos, surgiram vestígios: Prefetch → indicava execução recente de aplicativos Jump Lists → revelavam arquivos acessados, mesmo após exclusão Lixeira (Recycle Bin) → continha arquivos “apagados” ainda recuperáveis Registro do Windows (Registry) → chaves como: RecentDocs UserAssist RunMRU Cada item reconstruía hábitos do usuário. Nada ali gritava culpa… mas tudo sussurrava comport...

Fundamentals of Cloud Security

Fundamentals of Cloud Security

4.7 (3 avaliações)
economies of scale and agility
Clique no cartão para virá-lo 👆
1 / 77
Termos nesta lista (77)
Which software development concept that also has been applied more generally to IT says that additional future costs for rework are anticipated due to an earlier decision or course of action that was necessary for agility but was not necessarily the most optimal or appropriate decision or course of action?

role-based access control
technical debt
software lifecycle
runtime environment
In which cloud service model are customers responsible for securing their virtual machines and the virtual machine operating systems, and for operating system runtime environments, application software, and application data?

platform as a service (PaaS)
identity as a service (IaaS)
software as a service (SaaS)
infrastructure as a service (IaaS)
Which phased approach of hybrid cloud security requires networking and security solutions that not only can be virtualized but also are virtualization-aware and can dynamically adjust as necessary to address communication and protection requirements, respectively?

consolidation servers within trust levels
dynamic computing fabric
consolidation servers across trust levels
selective network security virtualization
Which SASE security-as-a-service layer capability provides visibility into SaaS application use, understands where sensitive data resides, enforces company policies for user access, and protects data from hackers?

secure web gateway (SWG)
data loss prevention (DLP)
firewall as a service (FWaaS)
cloud access security broker (CASB)
Which Prisma SaaS feature connects directly to the applications themselves and provides continuous silent monitoring of the risks within sanctioned SaaS applications, with detailed luminosity that is not possible with traditional security solutions?

granular data visibility
large scale data control
data exposure visibility
contextual data exposure
What is the meaning of a SaaS application that is advertised as being HIPPA compliant?
A. Regardless of how you configure the application for your enterprise, you will be HIPPA compliant.
B. If your administrator configures the security settings on the application correctly, you will be HIPPA compliant.
C. If your administrator and your users use the application correctly, you will be HIPPA compliant.
D. If your administrator and your users use the application correctly, the application will not cause you to not be HIPPA compliant.
Which systems must you secure to ensure compliance with security standards?
A. the servers in the data center
B. the devices owned by the enterprise, whether they are servers in the data center, cloud vms you manage, or user endpoint devices
C. any system where the data for which you are responsible goes
D. every device that is either owned by the enterprise, or used by enterprise employees
True or False? Prisma SaaS is used to protect sanctioned SaaS use, as part of an integrated security solution that includes next-generation firewalls to prevent unsanctioned SaaS use. Prisma SaaS communicates directly with the SaaS applications themselves and therefore does not need to be deployed inline and does not require any software agents, proxies, additional hardware, or network configuration changes.
What is the relationship between SIEM and SOAR?
A. SIEM products implement the SOAR business process.
B. SIEM and SOAR are different names for the same product category.
C. SIEM systems collect information to identify issues that SOAR products help mitigate.
D. SOAR systems collect information to identify issues that SIEM products help mitigate.
Which two advantages does endpoint protection technology have over network traffic analysis? (Choose two.)
A. ability to identify most common attacks by their symptoms
B. deployed and managed centrally
C. easier to deploy endpoint protection when people work from home
D. detects command and control channels
E. can easily identify worms
What is the order in which the endpoint checks if a new program is safe?
A. behavioral threat protection, then local analysis, then WildFire query
B. local analysis, then behavioral threat protection, then WildFire query
C. WildFire query, then local analysis, then behavioral threat protection
D. local analysis, then WildFire query, then behavioral threat protection

Comentários

Como usar um Agente OSINT IA

Pericia Digital

Ebook

Postagens mais visitadas