IT Examiner School, Palm Springs, CA

System Monitoring (cont.)

System monitoring  should include:

•Security Information and  Event Management (SIEM) ‐ logging and event tool •File Integrity Monitoring  •Vulnerability Management •Security Configuration  Management ‐ automates  hardening of devices, etc. •IDS/IPS

Risks Associated with Technology

Unauthorized access is the #1 Risk

Made with FlippingBook - professional solution for displaying marketing and sales documents online