Difference between revisions of "Indicators of Compromise"
From MgmtWiki
(→References) |
(→References) |
||
Line 6: | Line 6: | ||
==References== | ==References== | ||
+ | * See this [https://www.cisa.gov/uscert/ncas/alerts/aa22-249a CISA page] for some examples of IoCs. | ||
[[Category: Glossary]] | [[Category: Glossary]] | ||
[[Category: Exploit]] | [[Category: Exploit]] | ||
[[Category: Vulnerability]] | [[Category: Vulnerability]] |
Latest revision as of 13:45, 6 September 2022
Full Title or Meme
Indicators of Compromise (IoC) are flags that can be set in a computing environment to detect an Exploit,
Context
Many Vulnerability Exploits can only be detecting by looking for changes in the targeted systems.
References
- See this CISA page for some examples of IoCs.