Little boy questioned his mother, he asked what he can be in the future..with a sad smile, she tells him he can be anything he wants to be.... Boy said he’d become (an) astronaut and fly out into space crews around the universe he wanted to see the stars and also see other planets in outer space------------- "Why don’t we just keep dreaming, let’s keep our mind with dream and faith, as long as we wish we can make it come true, how old you are never forget your dream and keep dreaming "

Saturday 11 August 2018

External Resouces : Organisasi external dalam Insiden Keamanan Security Operation Center (SOC)

Semua SOC membutuhkan tools yang efektif, analis keamanan dengan latar belakang teknis yang komprehensif, dan hubungan yang kuat dengan organisasi eksternal. Kunci untuk membangun hubungan yang kuat dan positif dengan para pemangku kepentingan bisnis utama adalah komunikasi langsung dan singkat. Penting bagi analis keamanan untuk mengidentifikasi sumber daya utama dari TI, jaringan, dan perangkat lunak atau organisasi basis data jika terjadi insiden. Anda mungkin ingin membuat diagram yang menjabarkan hubungan pemangku kepentingan bisnis dengan sumber daya terkait, termasuk metode komunikasi yang optimal.

dibawah ini hanya menyediakan beberapa contoh sumber daya eksternal yang mungkin ingin dirujuk organisasi ketika menyelidiki eksploitasi potensial.
ID-CERT (Indonesia) : https://www.cert.or.id/beranda/id/
ID-SIRTI/CC (Indonesia) : https://idsirtii.or.id/



Recommended Security Tool Bookmarks

Malware detection and analysis sites:

https://www.virustotal.com/

http://totalhash.com/

https://www.hybrid-analysis.com/

http://www.herdprotect.com/knowledgebase.aspx

http://www.phishtank.com/

http://md5hashing.net/hash_type_checker

http://threatglass.com/tiles

https://threatcrowd.org

Web content verification sites:

https://hackvertor.co.uk/public

https://www.senderbase.org/

http://urlquery.net/

http://ipvoid.com/

http://pgl.yoyo.org/urlex/

http://www.internetofficer.com/seo-tool/redirect-check/

Network utilities:

http://www.whatismyip.com/ip-address-host-name-lookup/

http://centralops.net/co/

https://www.robtex.com/

http://www.tcpiputils.com/browse/ip-address

http://dnsviz.net/

http://www.ipaddressguide.com/cidr

Scripting utilities:

http://snarkles.net/scripts/sneak/sneak.php

http://utf-8.jp/public/jjencode.html

http://ddecode.com/phpdecoder/

Blogs and Feeds
The following blogs and feeds are recommended for the security analyst:

http://blogs.cisco.com/security/

https://twitter.com/

http://malware-traffic-analysis.net/

http://malware.dontneedcoffee.com/

http://myonlinesecurity.co.uk/

http://krebsonsecurity.com/

http://blog.dynamoo.com/

http://sanesecurity.blogspot.co.uk/

http://blog.0x3a.com/

http://blog.trendmicro.com/trendlabs-security-intelligence/

https://techhelplist.com/index.php/spam-list

https://www.virustotal.com/en/community/

http://blog.didierstevens.com/

http://www.securiteam.com

http://isc.sans.edu

http://www.darknet.org.uk/

http://www.newsnow.co.uk/h/Technology/Security


https://threatcrowd.org

Jika ada yang ingin menambah dipersilahkan ^^

No comments:

Post a Comment