E I S X
__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"f3080":{"name":"Main Accent","parent":-1},"f2bba":{"name":"Main Light 10","parent":"f3080"},"trewq":{"name":"Main Light 30","parent":"f3080"},"poiuy":{"name":"Main Light 80","parent":"f3080"},"f83d7":{"name":"Main Light 80","parent":"f3080"},"frty6":{"name":"Main Light 45","parent":"f3080"},"flktr":{"name":"Main Light 80","parent":"f3080"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"f3080":{"val":"rgb(170, 204, 255)","hsl":{"h":216,"s":0.99,"l":0.83}},"f2bba":{"val":"rgba(168, 203, 255, 0.5)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"trewq":{"val":"rgba(168, 203, 255, 0.7)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"poiuy":{"val":"rgba(168, 203, 255, 0.35)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"f83d7":{"val":"rgba(168, 203, 255, 0.4)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"frty6":{"val":"rgba(168, 203, 255, 0.2)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"flktr":{"val":"rgba(168, 203, 255, 0.8)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}}},"gradients":[]},"original":{"colors":{"f3080":{"val":"rgb(23, 23, 22)","hsl":{"h":60,"s":0.02,"l":0.09}},"f2bba":{"val":"rgba(23, 23, 22, 0.5)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.5}},"trewq":{"val":"rgba(23, 23, 22, 0.7)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.7}},"poiuy":{"val":"rgba(23, 23, 22, 0.35)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.35}},"f83d7":{"val":"rgba(23, 23, 22, 0.4)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.4}},"frty6":{"val":"rgba(23, 23, 22, 0.2)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.2}},"flktr":{"val":"rgba(23, 23, 22, 0.8)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.8}}},"gradients":[]}}]}__CONFIG_colors_palette__
  • Jean-Christoph von Oertzen
  • Blog
  • Infosec encyclopedia
  • Home
  • |
  • Tag: intrusion detection

vulnerabilities, threats, attacks and countermeasures

EDR

EDR: Endpoint Detection and Response ...

Read More

IDS

IDS: Intrusion Detection System also NIDS: Network Intrusion Detection System :de: System zur Erkennung ...

Read More

principles, frameworks and best practices

IOC

IOC: Indictaor Of Compromise An Indicator of Compromise (IOC) is a piece of digital ...

Read More

IPS

IPS: Intrusion Prevention System Such a system does not prevent an initial breach but ...

Read More

lingo

SIEM

SIEM: Security Information and Event Management Security alerts based on real-time information. Log aggregation ...

Read More

principles, frameworks and best practices

SOAR

SOAR: Security Orchestration Automation and Response […] is a stack of compatible software programs ...

Read More
Load More
__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"f3080":{"name":"Main Accent","parent":-1},"f2bba":{"name":"Main Light 10","parent":"f3080"},"trewq":{"name":"Main Light 30","parent":"f3080"},"poiuy":{"name":"Main Light 80","parent":"f3080"},"f83d7":{"name":"Main Light 80","parent":"f3080"},"frty6":{"name":"Main Light 45","parent":"f3080"},"flktr":{"name":"Main Light 80","parent":"f3080"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"f3080":{"val":"rgb(23, 23, 22)"},"f2bba":{"val":"rgba(23, 23, 22, 0.5)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"trewq":{"val":"rgba(23, 23, 22, 0.7)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"poiuy":{"val":"rgba(23, 23, 22, 0.35)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"f83d7":{"val":"rgba(23, 23, 22, 0.4)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"frty6":{"val":"rgba(23, 23, 22, 0.2)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"flktr":{"val":"rgba(23, 23, 22, 0.8)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}}},"gradients":[]},"original":{"colors":{"f3080":{"val":"rgb(23, 23, 22)","hsl":{"h":60,"s":0.02,"l":0.09}},"f2bba":{"val":"rgba(23, 23, 22, 0.5)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.5}},"trewq":{"val":"rgba(23, 23, 22, 0.7)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.7}},"poiuy":{"val":"rgba(23, 23, 22, 0.35)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.35}},"f83d7":{"val":"rgba(23, 23, 22, 0.4)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.4}},"frty6":{"val":"rgba(23, 23, 22, 0.2)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.2}},"flktr":{"val":"rgba(23, 23, 22, 0.8)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.8}}},"gradients":[]}}]}__CONFIG_colors_palette__

Copyright 2023 Jean-Christoph von Oertzen - Privacy policy - Imprint