IT Examiner School, Seaside, CA

System Monitoring (cont.) • System monitoring should include:

– Security Information and Event Management (SIEM) - logging and event tool – File Integrity Monitoring – Vulnerability Management – Security Configuration Management - automates hardening of devices, etc. – IDS/IPS

Risks Associated with Technology

Unauthorized access is the #1 Risk

Made with FlippingBook - Online catalogs