Summary: Detect

Get a recap of how monitoring and detection have been discussed in this chapter.

Overview

This chapter provided us with a good overview of building the capability to detect and protect against different types of attacks.

Mitigation

Mitigation involves using a combination of detective and protection controls placed at strategic locations throughout the network and the internet-facing ...