Chapter 9: Information Security Monitoring Tools and Techniques
In this chapter, we will discuss the methods, tools, and techniques for monitoring information security. We will discuss the technical aspects of implementing firewalls, as well as how intrusion prevention systems (IPSes) and intrusion detection systems (IDSes) function. We will also discuss some important aspects of digital signatures, public key infrastructure (PKI), and asymmetric encryption, which are very important from the CISM exam's perspective.
The following topics will be covered in this chapter:
- Firewall types and their implementation
- IDSes and IPSes
- Digital signature
- Elements of PKI
- Asymmetric encryption
Let's understand each of these topics in detail.
Firewall ...
Get Certified Information Security Manager Exam Prep Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.