Summary: Detect
Get a recap of how monitoring and detection have been discussed in this chapter.
Overview
This chapter provided us with a good overview of building the capability to detect and protect against different types of attacks.
Mitigation
Mitigation involves using a combination of detective and protection controls placed at strategic locations throughout the network and the internet-facing ...