Using Processes to Reduce Risk
This chapter covers the following topics:
Proactive and Detection: This section covers hunts, developing countermeasures, and deceptive technologies such as honeynets, honeypots, decoy files, simulators, and dynamic network configurations.
Security Data Analytics: This section describes security data analytics, such as processing pipelines (both data and stream), indexing and search, log collection and curation, and database activity monitoring.
Preventive: This section covers antivirus, immutable systems, hardening, and sandbox detonation.
Application Control: This section covers license technologies, allow list vs. block list, time of check vs. time of use, and atomic execution.
Security Automation: ...