COMPTIA Security+ Tutorial: Module 03,Part 06 – DETERRENCE AND MITIGATION

The various attack types can affect the computer’s performance. We can monitor the system logs to deter and mitigate the attacks. in this latest COMPTIA Security+ Tutorial, we will cover more about Deterrence and Mitigation techniques. 

You can check for the Event Logs, Audit Logs, Security Logs, and Access Logs. As soon as someone realize that there is a problem, make sure to have hardening, that is, disable the unnecessary service, protect management interfaces and applications, protect everything with a  password, and disable unnecessary accounts.

SECURITY TRAITS AND VULNERABILITIES

In the network environment, we use the security assessment tools that may include:

  1. Protocol Analyzer
  2. Vulnerability Scanner
  3. Honey Pot
  4. Honey Net
  5. Port Scanner
  6. Banner Grabbing
  7. Our assessment is based to find out the :
  8. Threats
  9. Risks
  10. Vulnerabilities