IT Examiner School, Seaside, CA
System Monitoring (cont.) • System monitoring should include:
– Security Information and Event Management (SIEM) - logging and event tool – File Integrity Monitoring – Vulnerability Management – Security Configuration Management - automates hardening of devices, etc. – IDS/IPS
Risks Associated with Technology
Unauthorized access is the #1 Risk
Made with FlippingBook - Online catalogs