Chapter 19

Understanding Monitoring and Auditing

CERTIFICATION OBJECTIVES

19.01     Introduction to Monitoring

19.02     Monitoring Tools

19.03     Implementing Logging and Auditing

QQUESTIONS

Monitoring networks and host computers proactively can detect attacks or even prevent their success. Network-based intrusion detection systems detect and report suspicious network activity. Host-based intrusion detection systems detect and report suspicious host-based activity. Prevention systems can stop attacks once they have begun. Log files present a method of tracing activity that has already occurred. Today’s networks include logs in many places; you must know which log to consult under specific circumstances. Luckily, centrally monitoring and responding ...

Get CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501), 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.