IT Examiner School, Providence, RI

System Monitoring (cont.)

System monitoring  should include:

•Security Information and  Event Management (SIEM) ‐ logging and event tool •File Integrity Monitoring  •Vulnerability Management •Security Configuration  Management ‐ automates  hardening of devices, etc. •IDS/IPS

Risks Associated with Technology

Unauthorized access is the #1 Risk

Made with FlippingBook Annual report