Summary

This document discusses the threat hunting maturity model (HMM). It describes the different stages of maturity, from Initial to Leading, in the context of cybersecurity threat hunting processes. The document uses keywords like threat hunting, cybersecurity, and network security.

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools Threat Hunting Maturity IModel (HMIM)...

Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools Threat Hunting Maturity IModel (HMIM) (HIMIM) O The threat hunting maturity model (HMM) describes the quantity and quality of information collected from a network for investigation Q ' %y - 3 =3 » < 4 B g " [[AYA) VY Level 0: Level 1: Level 2: Level Level 33: - Level 4: ovative = Primarily *= Follows the = Adopts data = Creates (Creates | = Automates Automates depends on latest threat analysis custom data existing data automated reports reports procedures analysis analysis monitoring created by procedures procedures systems and = Moderate- Moderate- to others alerts igh- level hugh. hngh- *= High- to very- High- igh- to very

Use Quizgecko on...
Browser
Browser