8

Information Security Monitoring Tools and Techniques

In this chapter, you will learn about the methods, tools, and techniques for monitoring information security. You will explore the technical aspects of firewall implementation and understand the functions of intrusion prevention systems (IPSs) and intrusion detection systems (IDSs). You will also discover some important aspects of digital signatures, public key infrastructure (PKI), and asymmetric encryption, which are very important from the CISM exam perspective.

The following topics will be covered in this chapter:

  • Firewall Types and Implementations
  • Intrusion Detection Systems and Intrusion Prevention Systems
  • Digital Signatures
  • Elements of Public Key Infrastructure
  • Cryptography
  • Penetration ...

Get Certified Information Security Manager Exam Prep Guide - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.