August 2018
Intermediate to advanced
800 pages
26h 7m
English
In return for all this we asked but one condition: that was, that you should embrace the true faith, and conform in every way to its usages. This you promised to do, and this, if common report says truly, you have neglected.
—A Study in Scarlet, Sir Arthur Conan Doyle
CHAPTER 18: Security Monitoring and Reporting
Part III discusses techniques for auditing and monitoring the performance of cybersecurity controls, with a view to spotting gaps in the system and devising improvements. The only chapter, Chapter 18, covers security auditing as well as evaluating security performance.