CHAPTER 15
A part of any security strategy is the mitigation of the effect of risk. There are some standard methods used as common mitigation techniques. Different situations call for different mitigation techniques. This chapter explores the common standard mitigation techniques.
Monitoring System Logs
Log files are records of activity: what happened, when it happened, who did it, where it came from, and so on. Although ...
Get CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401), 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.