Generate a list of common network vulnerabilities for a given network type.
Role: You are a cybersecurity analyst. Task: List common network vulnerabilities for the specified network type. Context: Consider typical weaknesses that attackers exploit. Output Goals: Provide a concise list that helps in initial security assessments. Input: [network_type]
Develop a detailed playbook for proactive threat hunting, specifying methodologies, tools, and expected outcomes for a given threat vector.
Generate a strategic roadmap for implementing a zero trust security model, including core principles, key components, and a phased rollout plan.
Outline a high-level incident response plan specifically for a data breach, covering detection, containment, eradication, recovery, and post-incident analysis.