What is Incident Response | Become a Incident Handler - EC ...

文章推薦指數: 80 %
投票人數:10人

Response is a part of Incident Handling which in turn looks at the logistics, communications, synchronicity, and planning required to resolve an incident. This ... WhatisIncidentResponse? YourUltimateGuideto IncidentResponse EthicalHacking WhatisEthicalHacking? WhatarethebenefitsofEthicalHacking? WhatarethephasesofEthicalHacking? DifferenttypesofEthicalHacking Differencebetweenethicalhackerandpenetartiontesting PenetrationTesting WhatisPenetrationTesting? WhatarethephasesofPenetrationTesting? BasicattackvectorsthatPenTestersuse WhatarethebenefitsofPenetrationTesting? TypesofPenetrationTesting WhatistheBestPenetrationTestingTool? DifferentWaysToConductAPenetrationTest ResponsibilitiesofaPenetrationTester NetworkSecurity WhatisNetworkSecurity? Whatisacomputernetworkanditscomponents? WhatareNetworkThreats? WhataretheTypesofNetworkSecurityAttacks? WhatisNetworkSecurityVulnerability? NetworkProtocolsanditstypes Whatarethevariousnetworksecuritytechniques? Howdoyouanalyzenetworktraffic? RequisitesofaNetworkSecuritytrainingprogram DigitalForensics WhatisDigitalForensics? WhatarethestepsinvolvedinDigitalForensics? WhoisaDigitalForensicsInvestigator? HistoryofDigitalForensics WhatarethephasesofDigitalForensics? WhatarethebestDigitalForensicsTools? WhatarethejobprofilesinDigitalForensics? WhatarethechallengesthataComputerForensicAnalystfaces? RequisitesofaDigitalForensicstrainingprogram SOC WhatisaSOC? ImportanceofSOCfororganizations HowdoesaSOChelp? WhatAreTheResponsibilitiesofaSOC? HowtobuildagreatSOC? HowisaSOCdifferentfromaCSIRT? DisasterRecovery WhatIsaBusinessContinuityPlan? WhataretheaspectsofaBusinessContinuityPlan? WhatarethekeycomponentsofaBusinessContinuityPlan? WhatisDisasterRecovery? ImportanceofaDisasterRecoveryPlan DisasterRecoveryPlanVsBusinessContinuityPlan HowcanAIpredictdisasters? Significanceofacertifiedandskilledcybersecurityworkforce TopCertificationsinBusinessContinuity IncidentResponse WhatisIncidentResponse? WhyIsIncidentResponseImportant? Whatshouldanincidentresponseplaninclude? WhatisanIncidentResponseProcess? Phasesoftheincidentresponselifecycle WhatisanIncidentResponsePlan? BuildinganIncidentResponseTeam BestIncidentResponseTools HowtoBecomeaCertifiedIncidentHandler? ThreatIntelligence WhatisThreatIntelligenceinCybersecurity? WhoisACyberThreatIntelligenceAnalyst? WhatAreTheTypesofThreatIntelligence? CreatingaCyberThreatIntelligenceProgram HowDoYouImplementCyberThreatIntelligence? Planningforathreatintelligenceprogram WhatisAThreatIntelligenceFeed? Howdoyouusecyberthreatintelligence? HowDoYouBecomeaThreatIntelligenceAnalyst? DOSAttacks DenialofService(DoS)Attacks HowDoDenialofServiceAttacksWork? WhatIstheMostCommonFormofDoSattacks? WhatIsDistributeddenialofservice(DDoS)Attack? WhatisaDDoSBotnet? WhatCausesDOSandDDOSattacks? HowtoStopDDoSandDoSattacks CISSP WhatnextafterCISSP? EnterpriseArchitect WhatDoYouNeedToKnowToBeAnEnterpriseArchitect? WhatDoesanEnterpriseArchitectDo? WhyEnterpriseArchitecture? ObjectivesofanEnterpriseArchitect WhataretheSkillsNeededtoBeanEnterpriseArchitect? HowDoIBecomeanEnterpriseArchitect? SQLInjection WhatIsanSQLInjectionAttack? WhyDoHackersUseSQLInjection? HowDoesSQLInjectionWork? WhatIsanexampleofSQLInjection? WhataretheTypesofSQLInjection? CanSQLInjectionbetraced? HowcanSQLInjectionbeprevented? HowtoRecoverfromanSQLInjectionAttack? WhatisIncidentResponse? Incidentresponseisastructuredapproachtohandlevarioustypesofsecurityincidents,cyberthreats,anddatabreaches.Theincidentresponsemethodologyaimstoidentify,contain,andminimizethecostofacyberattackoraliveincident.Awell-builtincidentresponse(IR)plancanfixapotentialvulnerabilitytopreventfutureattacks,butitisnotthesumgame.ResponseisapartofIncidentHandlingwhichinturnlooksatthelogistics,communications,synchronicity,andplanningrequiredtoresolveanincident.ThistypeofworkisgenerallydonebytheComputerSecurityIncidentResponseTeam(CSIRT)withthehelpoftheSecurityOperationCenter.WhilethecoreofCSIRTisincidentmanagement,itsrolealsoincludesreporting,analysis,andresponse.However,priortothesestages,itisimportantthattheincidentisidentifiedandreportedontime.ItisduringthisstagethattheroleofaSOCAnalystbecomesimportant.AllofthisisbesttaughtinEC-Council’sIncidentHandlingProgram–acoursemadebysomeofthebestindustrypractitioners. “Withasuccessfulincidentresponseprogram,damagecanbemitigatedoravoidedaltogether.” ChrisMorales,HeadofSecurityAnalytics,Vectra   WhyIsIncidentResponseImportant? Databreachescostcompanies’operationaldowntime,reputational,andfinancialloss.Thelongeranyvulnerabilitystaysinasystem,themorelethalitbecomes.Formostoftheorganizations,breachesleadtodevaluationofstockvalueandlossofcustomertrust.Toeliminatesuchrisks,companiesneedawell-plannedcybersecurityincidentresponseplan,whichaimsat– Restoringdailybusinessoperations Minimizingfinancialandreputationallosses Fixingcybervulnerabilitiescomprehensivelyandquickly Strengtheningsecurityposturetoavoidfutureattacks KnowIncidentResponseFundamentals Anotherimportantobjectiveistoalignthesecurityposturewithapplicableregulatorystandards.Organizationsshouldcomplywiththesestandardstoavoidheftyfinesandpenalties.Afewofthesignificantactsandregulationsarelistedbelow– HIPAA (forthehealthcareindustry)PCIDSS (forpaymentindustry)Gramm-Leach-BlileyAct (forthefinancialservicesindustry) FISMA (forfederalagencies) HIPAA(forthehealthcareindustry) TheHealthInsuranceProbabilityandAccountabilityAct(HIPAA)isdesignedtosafeguardProtectedHealthInformation(PHI)storedinanelectronicform.BeingHIPAAcompliant,thehealthcareinstitutionsfollowtheHIPAASecurityRuleandensuretoimplementadministrative,technical,andphysicalsafeguards,thus,protectsensitivepersonalandhealthinformation. Tolearnmore:HIPAA:AllThatYouShouldKnow PCIDSS(forpaymentindustry) ThePaymentCardIndustryDataSecurityStandard(PCIDSS)isasecuritystandardwiththeprimaryobjectiveofprotectingcreditanddebitcardtransactionsagainstdatatheftandfraud.EventhoughPCIDSScomplianceisnotmandatory,businessesshouldfollowtheirguidelinestosecuretheircreditanddebitcardtransactions.BeingPCIDSScomplianthelpsinbuildingtrustrelationshipswithstakeholdersandcustomers. Tolearnmore:AIntroductiontoPCIDSS Gramm-Leach-BlileyAct(forthefinancialservicesindustry) Gramm–Leach–BlileyAct(GLBA)isanactthathelpsinimprovingcompetitionintheindustry.Itsmainaimistoensuresecurityandconfidentialityofcustomerdata,safeguardintegritybyprotectionagainstpotentialcyberthreatsandunauthorizedaccess,andproperdisposalofcustomerdata. Tolearnmore:AllAboutGramm-Leach-BlileyAct FISMA(forfederalagencies) TheFederalInformationSecurityManagementAct(FISMA)isacomprehensiveframeworkapplicabletoUS-basedfederalagencies.Theactprotectsgovernmentinformation,operations,andinformationassetsagainstnaturaldisastersandcyberattacks. Tolearnmore:FederalInformationSecurityManagementActof2002 Whatarethecommontypesofincidents? Phishingattacks 350%riseinphishingwebsitesatthestartof2020–UnitedNations Denial-of-Serviceattacks 595%year-over-yearincreaseinDDoSattacksagainstutilitiesworldwide–NETSCOUT Ransomwareattacks 20%hikeinransomwareattackswithin6-months,amountingto121.4millionevents–SonicWall SQLinjections 8000%riseinSQLInjectionattacksin2019,versus2018–WatchGuard Malwareattacks 176%increaseinnewmalwareattacksdisguisedasMicrosoftOfficefiletypes–SonicWall IncidentHandlingVs.IncidentManagementVs.IncidentResponse IncidentResponse Itisasetoftechnicalactivitiesdoneinordertoanalyze,detect,defendagainst,andrespondtoanincident.Itisapartoftheincidenthandlingandincidentmanagementprocess.Itisoftenusedinsynchronywiththetermincidenthandling. IncidentHandling Itistheprocessandproceduresthatarepredefinedtomanageanincident.Itinvolvestheplanningandtheactionablestage,before,during,andafteranincidentisdetected. IncidentManagement Bothincidenthandlingandincidentresponsegohandinhand.Itisoftenassumedasonefunctionforbettereaseinprocesses.Thisiswhereincidentmanagementcomesin.Incidentmanagementisthescopeofhavingbothincidentresponseandincidenthandlingcometogethertoensuretheend-to-endprocess,rightfromreportinganissuetoplanningandresolvingtheissue. IncidentManagementandBusinessContinuity Oneofthebiggestchallengesofincidentmanagementistheunpredictabilityofanongoingsecurityincidentandcommunicationgaps.Buildingaquick,effective,transparent,andreal-timeincidentresponseplanhelpsminimizethedowntimeandimpactsofthecyberattack.ItalsoallowsimplementingathoroughBusinessContinuityPlan.Tosimplyput,anincidentresponseplan(IRP)andabusinesscontinuityplan(BCP)goeshand-in-hand. WhatisanIncidentResponsePlan? Anincidentresponseplan(IRP)isadocumentedsetofinstructionsthathelpincidentresponderstodetectandrespondtosecurityincidents.Theplanalsoensuresthesuccessfulrecoveryoftheaffectedsystem.AnIRPisawell-strategizedplanagainstsecuritybreaches,dataloss,andserviceoutages. WhyshouldyouhaveanIncidentResponsePlan? Noorganizationalsystemornetworkissafefromcyberattacks.Insuchanenvironment,anincidentresponseplanhelpsmitigatethesecurityrisksandfightagainstcripplingcybercrimes. Whatshouldanincidentresponseplaninclude? AnincidentthatactivatesanIRplanalsoinitiatestheBCPforcontinuousbusinessoperations.BothincidenthandlersandBCPteamleadersneedtimelyandaccurateinformationtotakeproperstepsagainsttheunanticipatedevent.Thefollowingelementsofincidentmanagementsystemshelpinofferingeffectivebusinesscontinuity– 1.InitialResponseStatistics Forinitialresponsestatistics,employeesneedimportantinformationinareal-timeenvironment.Thisdatahelpsincidentresponderstotakeresolutionsagainstescalatingsituationsswiftly.Beingcapableofestablishinganintuitive,customizablesystemisimportantforincidentmanagement. 2.Reporting Incidentmanagerscantakeproperactionsagainstacomputersecurityincidentonlyiftheyhaveaccuratelyreportedinformation.Thisprocessneedsreal-timedetailsoftheincidenttocustomizeaproperresponse. 3.Feedback Aftertheresolutionoftheincident,honestfeedbackfromthestakeholderscanimprovetheexistingincidentmanagementsystem. Toknowmoreabouttheincidentresponseinadistributedworkforceusingcloudforensics,checkoutthisamazingvideobyMichaelWeeks,LeadIncidentResponseEngineeratFICO. KnowMoreaboutIncidentResponseInADistributedWorkforceUsingCloudForensics WhatisanIncidentResponseProcess? Anincidentresponseprocesshelpsanorganizationtoremaininbusiness.Itisanaccumulationofvariousprocedurestargetedatidentifying,analyzing,andrespondingtopotentialsecurityincidents.Theprimaryobjectiveoftheprocessistominimizetheimpactandofferrapidrecovery. Insimplewords,incidentresponsemethodologyhandlessecurityincidents,breaches,andpossiblecyberthreats.Itcomeswithanincidentresponseplandesignedtoidentifythecyber-attack,minimizeitsimpact,andreducethefinancialburden. HowisIncidentResponseProcess(OODALoop)DifferentfromNISTIncidentResponseLifeCycle? OODAloopwasdevelopedbytheUSAirForcemilitarystrategistJohnBoyd.OODAstandsforObserve,Orient,Decide,andAct.Itisusedtotackleincidenthandlinginareal-timeenvironment. Cycle Description ToolsandTactics KeyTakeaways Observe Continuoussecuritymonitoringhelpsinidentifyingabnormalnetwork/systembehavior Loganalysis,SIEMandIDSalerts,networkmonitoring,vulnerabilityanalysis,service/applicationperformancemonitoring Observeasmuchasyoucan,anddocumentallthefindingsrelatedtothesecuritysystem,network,andbusinessoperations.Thisphasehelpsinsuccessfullyrespondinganddefendingtheincident. Orient Evaluationofthecyberthreatlandscapeoftheorganization.Logicallyconnectandbringoutreal-timecontexttoprioritizesecurityincidents. Incidenttriage,threatintelligence,awarenessregardingthecurrentsituation,securityresearch Thinklikethecybercriminaltobuildthoroughdefensestrategies.Takethehelpofthreatinteltocapturetherightinformation. Decide Basedonobservationsandcontext,decideanactionplanthatoffersminimaldowntimeandfastestsystemrecovery Organization’sowncorporatesecuritypolicy Documentdifferentaspectsoftheprocess Act Remediation,recovery,anddocumentinglessonslearnedforfutureuse Forensicanalysistools,systembackup,datarecoverytools,securityawarenesstrainingtoolsandprograms,patchmanagement Improvethetrainingmethodsandcommunicationtoeliminatetheincidenteffectively TheNISTcybersecurityframeworkhelpstheprivatesectororganizationsoftheUnitedStatestoimprovetheirprevent,detect,andresponseprocessesagainstcyberattacks.Theframeworkoffershigh-leveloutcomestoassessandmanagesecurityincidents.TheUSNationalInstituteofStandardsandTechnologyreleasedthefirstversionoftheNISTframeworkin2014;ithascontinuouslyevolvedsincethen.Itsrecentversionincludesguidanceonconductingself-assessments,interactingwithsupplychainstakeholders,anddevelopingavulnerabilitydisclosureprocess. WhatarethephasesoftheincidentresponselifecycledefinedbyNIST? TheNISTframeworkisorganizedintofivemajorfunctions/phases–Identify,Protect,Detect,Respond,andRecover,whicharelatersubdividedinto23categories. Takealookatthefivephasesofincidentresponse: Function Description Categories Identify Developingorganizationalunderstandingtomanagevarioussecurityrisksrelatedtosystems,informationassets,data,andoperations AssetManagement(AM) BusinessEnvironment(BE) Governance(GV) RiskAssessment(RA) RiskManagementStrategy(RM) Protect Developingandimplementingsuitablesafeguardsforbetterdeliveryofcriticalinfrastructureservices AccessControl(AC) AwarenessandTraining(AT) DataSecurity(DS) InformationProtectionProcessesandProcedures(IP) Maintenance(MA) ProtectiveTechnology(PT) Detect Developingandimplementingprocessestoidentifysecurityincidents AnomaliesandEvents(AE) SecurityContinuousMonitoring(CM) DetectionProcesses(DP) Respond Developingandimplementingstrategiestorespondtothedetectedincidents ResponsePlanning(RP) Communications(CO) Analysis(AN) Mitigation(MI) Improvements(IM) Recover Developingandimplementingaplantorestorethebusinessoperationsaftertheoccurrenceoftheincident RecoveryPlanning(RP) Improvements(IM) Communications(CO) Tolearnmore:5StepstoBuildinganIncidentResponsePlanforaLargeOrganization Whatarethefivestepsofanincidentresponseplan? Herearethefiveincidentresponsesteps– Step1:Determinethecriticalcomponentsofthenetwork Toavoidmajordamages,replicateyourorganizationaldata,andstoreitinaremotelocation.Asbusinessnetworksarecomplex,notethebackuplocations,whichwillhelptheITstafftorecoverthenetworkquickly,wheneverrequired. Step2:Identifypointsoffailureinthenetworkandaddressthem Onceyouidentifythecriticalcomponents,createaplantoprotecttheseassets.Thepointsoffailurecanjeopardizetheentirenetwork.So,addressthemwithsoftwarefailoverfeaturesandotherrequiredtools. Step3:Developaworkforcecontinuityplan Duringadisasterorasecuritybreach,somelocationsorprocessesbecomeinoperableandinaccessible,butthisshouldnotaffecttheregularbusinessoperationsandemployeesecurity.Buildaplanwithvirtualprivatenetworks(VPNs)andsecurewebgatewaystohelpthestaffcontinuetheirworkwithoutstress. Step4:Formacybersecurityincidentresponseplan Documentaformalplanwiththelistofrolesandresponsibilitiesofincidentresponders,toolsandtechnologiesinvolved,andeffectivedatarecoveryprocesses. Step5:Stafftraining Everyemployeeshouldbewell-awareofdifferenttypesofcyberattacksandhowtoavoidthem. Alsocheckout:HowtoFrameanIncidentResponsePlan Readaboutphasesof Incidentresponse ReadmoreaboutHowtoFramean IncidentResponsePlan WhatisanIncidentResponseTeam? Acomputersecurityincidentresponseteam(CSIRT)helpsinmitigatingtheimpactofsecuritythreats.Withtherisingnumberofsecuritythreats,organizationsneedadedicatedteamforincidentresponse. Whatdoesanincidentresponseteamdo? TheCSIRTcomesintoactionwheneveranunexpectedeventoccurs.Therolesandresponsibilitiesofanincidentresponseteamarelistedbelow.Theteamgenerallycomprisesofincidentresponseanalysts,incidenthandlers,networkengineers,andafewotherdedicatedprofessionals. CreateandmaintainanIRplan Analyzethesecurityincident Manageinternalcommunicationsandalertswheneveranincidentoccurs Offereasycommunicationwithstakeholdersandthepresswheneverneeded Remediateincident Recommendtools,technologies,policy,andgovernanceaftertheincident Howtobuildanincidentresponseteam? Acoreincidentresponseteamconsistsof– IncidentResponseManager:Themanagersupervisestheentireprocessandprioritizestheactionsduringthedetection,analysis,containment,andrecoveryphases. SecurityAnalysts:Theseprofessionalsworktorecovertheaffectednetwork.TherearetwotypesofsecurityanalystsinanIRteam– TriageAnalysts–Theylookforpotentialthreatsandfilteroutfalsepositives. ForensicAnalysts–Theykeepdigitalevidencepreservedtoconductforensicinvestigationagainsttheincident. ThreatResearchers:Theyofferthreatintelligenceandcontextrelatedtotheincident. Alsocheckout:5CommonChallengesIncidentHandlingandResponseTeamsFace ProfessionalToolsUsedinIncidentResponse Businessesarefacingariseinsecurityincidents.Inthetechnologicallydrivenworld,theseincidentshavebecomeunavoidable.Thatiswhytheincidentresponseteamneedspowerfultoolstodefeatandcontainsecurityevents. Securityincidentsarecapableofcripplingabusiness.Theycanleadtofinancialloss,reputationalloss,negativepublicity,andevenanegativeimpactonthesalesandstockmarket.Itcanstripdownanorganizationfromitslong-earnedcredibility.Withthehelpoftools,incidentresponderscanquicklydetect,analyze,andrespondtointrusions. BestIncidentResponseTools LogRhythm ItisaNextGenSIEMplatformthatofferscomprehensivesecurityanalytics,userandentitybehavioranalytics(UEBA),networkdetectionandresponse(NDR),andsecurityorchestration,automation,andresponse(SOAR). SumoLogic Thetoolisbestforsecuringcloudinfrastructuresandadvancedapplications.Itprovidestherequiredanalyticsandinsights. InsightIDR ThisSaaSSIEMtoolisusedformodernthreatdetectionandresponse. CBResponse Itarmsincidentresponseteamwithreal-timeresponsecapabilitiesandexpertthreatanalysis. IBMQRadar Thistoolaccuratelydetectsandprioritizessecuritythreats. ReadaboutIncidentResponseAutomation IncidentResponseJobs TheresultsarefortheUSalone IncidentResponseManagerJobs SecurityAnalystsJobs TriageAnalystsJobs ForensicAnalystsJobs ThreatIntelligenceResearchersJobs Readmoreabout5commonchallengesfacedbyIncidentResponseTeams AverageSalaryofanIncidentHandler Accordingtosalary.com,theaveragesalaryofanIncidentHandlerintheUnitedStatesrangesfrom$79,213to$100,341. Thefluctuationinsalaryreliesonafewfactors,suchasthequalificationandskillsofthecandidate.Anexpertiseinseveralincidentresponsetoolshelpsanincidentresponderearnmore.Apartfromthat,thelocationofworkcanalsohaveanimpactonearning. ReadaboutwhyanIncidentResponse Certificationmatters ADayintheLifeofAnIncidentResponder Anincidentrespondermusthavevisibilityofhoweveryoneiscontributingtothenetworktraffic.Theactionsoftheseprofessionalsrevolvearoundtheprimaryobjectivesofreducingsecurityrisksandimprovingcustomertrust. Thedayofanincidentresponderstartswithlookingformalwareintheusersystems.TheseprofessionalsuseEndpointDetectionandResponse(EDR)formonitoringandrespondingtocyberthreats.Oncedone,theyshifttothedetectionofmalwareintheservers.Theyalsoperformthreathuntingandproactivemonitoring.Theybuildphishingcampaignstounderstandinternalandexternalthreats.Theyarealsoresponsiblefordevicemanagementthatincludescreatingasandboxenvironmentorhoneypot.Theseprofessionalstakepartinseveralmeetingsanddraftimportantreports. HowtoBecomeaCertifiedIncidentHandler? EC-Councildesignedacomprehensiveincidenthandlingcertificationcoursethatoffersaspecialistlevelincidentresponseskillsandknowledge.Theincidenthandlingtrainingprogramwillhelpyoudetect,analyze,contain,respondto,andrecoverfromasecurityincident.Togainnextlevelincidenthandlingskills,joinEC-CouncilCertifiedIncidentHandlertoday! ReadmoreaboutcoursesinIncidentHandling” WeCareEnsuringthatyougetthebestexperienceisouronlypurposeforusingcookies.Ifyouwishtocontinue,pleaseaccept.Youarewelcometoprovideacontrolledconsentbyvisitingthecookiesettings.Foranyfurtherqueriesorinformation,pleaseseeourprivacypolicy.Donotsellmypersonalinformation.CookieSettingsAcceptRejectManageconsent Close PrivacyOverview Thiswebsiteusescookiestoimproveyourexperiencewhileyounavigatethroughthewebsite.Outofthese,thecookiesthatarecategorizedasnecessaryarestoredonyourbrowserastheyareessentialfortheworkingofbasicfunctionalitiesofthewebsite.Wealsousethird-partycookiesthathelpusanalyzeandunderstandhowyouusethiswebsite.Thesecookieswillbestoredinyourbrowseronlywithyourconsent.Youalsohavetheoptiontoopt-outofthesecookies.Butoptingoutofsomeofthesecookiesmayaffectyourbrowsingexperience. Necessary Necessary AlwaysEnabled Necessarycookiesareabsolutelyessentialforthewebsitetofunctionproperly.Thesecookiesensurebasicfunctionalitiesandsecurityfeaturesofthewebsite,anonymously. CookieDurationDescriptioncookielawinfo-checkbox-analytics11monthsThiscookieissetbyGDPRCookieConsentplugin.Thecookieisusedtostoretheuserconsentforthecookiesinthecategory"Analytics".cookielawinfo-checkbox-functional11monthsThecookieissetbyGDPRcookieconsenttorecordtheuserconsentforthecookiesinthecategory"Functional".cookielawinfo-checkbox-necessary11monthsThiscookieissetbyGDPRCookieConsentplugin.Thecookiesisusedtostoretheuserconsentforthecookiesinthecategory"Necessary".cookielawinfo-checkbox-others11monthsThiscookieissetbyGDPRCookieConsentplugin.Thecookieisusedtostoretheuserconsentforthecookiesinthecategory"Other.cookielawinfo-checkbox-performance11monthsThiscookieissetbyGDPRCookieConsentplugin.Thecookieisusedtostoretheuserconsentforthecookiesinthecategory"Performance".viewed_cookie_policy11monthsThecookieissetbytheGDPRCookieConsentpluginandisusedtostorewhetherornotuserhasconsentedtotheuseofcookies.Itdoesnotstoreanypersonaldata. Functional Functional Functionalcookieshelptoperformcertainfunctionalitieslikesharingthecontentofthewebsiteonsocialmediaplatforms,collectfeedbacks,andotherthird-partyfeatures. Performance Performance Performancecookiesareusedtounderstandandanalyzethekeyperformanceindexesofthewebsitewhichhelpsindeliveringabetteruserexperienceforthevisitors. Analytics Analytics Analyticalcookiesareusedtounderstandhowvisitorsinteractwiththewebsite.Thesecookieshelpprovideinformationonmetricsthenumberofvisitors,bouncerate,trafficsource,etc. Advertisement Advertisement Advertisementcookiesareusedtoprovidevisitorswithrelevantadsandmarketingcampaigns.Thesecookiestrackvisitorsacrosswebsitesandcollectinformationtoprovidecustomizedads. Others Others Otheruncategorizedcookiesarethosethatarebeinganalyzedandhavenotbeenclassifiedintoacategoryasyet. SAVE&ACCEPT Pleasewaitwhileyouareredirectedtotherightpage... Pleaseshareyourlocationtocontinue. Checkourhelpguideformoreinfo.



請為這篇文章評分?