IT Examiner School, Palm Springs, CA
System Monitoring (cont.)
System monitoring should include:
•Security Information and Event Management (SIEM) ‐ logging and event tool •File Integrity Monitoring •Vulnerability Management •Security Configuration Management ‐ automates hardening of devices, etc. •IDS/IPS
Risks Associated with Technology
Unauthorized access is the #1 Risk
Made with FlippingBook - professional solution for displaying marketing and sales documents online