IT Examiner School, Providence, RI
System Monitoring (cont.)
System monitoring should include:
•Security Information and Event Management (SIEM) ‐ logging and event tool •File Integrity Monitoring •Vulnerability Management •Security Configuration Management ‐ automates hardening of devices, etc. •IDS/IPS
Risks Associated with Technology
Unauthorized access is the #1 Risk
Made with FlippingBook Annual report