Chapter 12. Security Architecture and Implementing Compensating Controls
This chapter covers the following topics:
4.0 Security Architecture and Tool Sets
4.3 Given a scenario, review security architecture and make recommendations to implement compensating controls.
Security Data Analytics: Discusses data aggregation and correlation, trend analysis, and historical analysis.
Manual Review: Covers reviewing firewall logs, Syslogs, authentication logs, and event logs.
Defense in Depth: Discusses the application of the defense-in-depth principle ...
Get CompTIA Cybersecurity Analyst (CySA+) Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.