CHAPTER 15

Mitigation Techniques

In this chapter, you will

     •   Learn how to select the appropriate type of mitigation and deterrent technique

     •   Learn how monitoring of system logs can mitigate risk

     •   Learn how system hardening can mitigate risk

     •   Learn how employing network security techniques can mitigate risk

A part of any security strategy is the mitigation of the effect of risk. There are some standard methods used as common mitigation techniques. Different situations call for different mitigation techniques. This chapter explores the common standard mitigation techniques.

Monitoring System Logs

Log files are records of activity: what happened, when it happened, who did it, where it came from, and so on. Although ...

Get CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401), 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.