Chapter 14

Using Processes to Reduce Risk

This chapter covers the following topics:

  • Proactive and Detection: This section covers hunts, developing countermeasures, and deceptive technologies such as honeynets, honeypots, decoy files, simulators, and dynamic network configurations.

  • Security Data Analytics: This section describes security data analytics, such as processing pipelines (both data and stream), indexing and search, log collection and curation, and database activity monitoring.

  • Preventive: This section covers antivirus, immutable systems, hardening, and sandbox detonation.

  • Application Control: This section covers license technologies, allow list vs. block list, time of check vs. time of use, and atomic execution.

  • Security Automation: ...

Get CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.