Chapter 14
Using Processes to Reduce Risk
This chapter covers the following topics:
Proactive and Detection: This section covers hunts, developing countermeasures, and deceptive technologies such as honeynets, honeypots, decoy files, simulators, and dynamic network configurations.
Security Data Analytics: This section describes security data analytics, such as processing pipelines (both data and stream), indexing and search, log collection and curation, and database activity monitoring.
Preventive: This section covers antivirus, immutable systems, hardening, and sandbox detonation.
Application Control: This section covers license technologies, allow list vs. block list, time of check vs. time of use, and atomic execution.
Security Automation: ...
Get CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.