Monitoring: The process of continuously collecting and analyzing data to identify potential security threats. It is used in IT security to identify and respond to potential security breaches in real-time. Examples include using network intrusion detection systems to monitor network traffic for anomalies and using security information and event management (SIEM) tools to collect and analyze logs from multiple sources.
Categories: CC D5: Security Operations | CCSP D5: Cloud Security Operations | CISM D4: Incident Management | CISSP D7: Security Operations | Security+ D4: Security Operations | SSCP D3: Risk Identification Monitoring and Analysis
Related Articles:
- Glossary: SSCP (Systems Security Certified Practitioner)
- Frequently Asked Questions FAQ CISSP, CISM, CC | ThorTeaches.com FAQGet answers to Frequently Asked Questions for your CISSP, CISM, & CC study. Learn how to study right, materials to use, tips and tricks, sales, and much more | ThorTeaches.com
- Glossary: Wireless attacks
- Glossary: Wiretapping
- Glossary: Vulnerability event
- Glossary: WAF (Web Application Firewall)
- Glossary: Web security gateway
- Glossary: Video monitoring or video surveillance
- Glossary: Video and audio recording tools
- Glossary: Third-party connectivity