How to Verify Security Controls

One specific class of monitoring controls can provide a very good layer of security. This class of controls monitors network and system activity to detect unusual or suspicious behavior, and some controls in this class can even respond to detected suspicious activity and possibly stop an attack in progress. Controls that monitor activity include IDSs, IPSs, and firewalls.

Get Fundamentals of Information Systems Security, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.