Enable Targeted Monitoring
Abstract
Until this point, focus has been on collecting digital evidence for the purposes of supporting one of the major business risk scenarios. However, by monitoring the indirect data sources that provide context to the major business risk scenarios, organizations can identify and detect events before they become major incidents.
Keywords
Acceptable activity; Analytics; Modern controls; Monitoring; Network securityGet Implementing Digital Forensic Readiness now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.