The various attack types can affect the computer’s performance. We can monitor the system logs to deter and mitigate the attacks. in this latest COMPTIA Security+ Tutorial, we will cover more about Deterrence and Mitigation techniques.
You can check for the Event Logs, Audit Logs, Security Logs, and Access Logs. As soon as someone realize that there is a problem, make sure to have hardening, that is, disable the unnecessary service, protect management interfaces and applications, protect everything with a password, and disable unnecessary accounts.
SECURITY TRAITS AND VULNERABILITIES
In the network environment, we use the security assessment tools that may include:
- Protocol Analyzer
- Vulnerability Scanner
- Honey Pot
- Honey Net
- Port Scanner
- Banner Grabbing
- Our assessment is based to find out the :
- Threats
- Risks
- Vulnerabilities