Topic 2: Real-Time Protection:
Using your knowledge from Internet research, and the course references, discuss real-time protection. Also discuss how a system administrator or security monitoring system might detect that real-time protection has been turned off.
Here is some extra references:
Hands-on Incident Response and Digital Forensics, by Mike Sheward, in the Library. You can access the text through the Library portal.
- Chapter 3: The Incident Response Process
In NIST Special Publication 800-83 Revision 1, , read the following:
- Chapter 4, Section 2: Detection and Analysis
National Institutes of Standards and Technology (NIST).
Thank you in advance.
What Students Are Saying About Us
.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"
.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."