CHAPTER 6
Local Host Security in the Real World
The following challenges provide contextual reference points for the concepts you will learn in Part II. Because you have not yet read the chapters in Part II, the challenges in this chapter are designed to introduce you to the local host scenarios you’ll face in the real world.
In this chapter, you’ll learn to:
- Apply applicable categories and sub-categories of the NIST Cyber Security Framework’s “Identify” function to a specific scenario to document the network’s assets and their possible vulnerabilities.
- Use applicable categories and sub-categories of the “Protect” function to generate specific policies and actions that can be used to secure the network’s assets for the specified scenario.
- Apply applicable categories and sub-categories of the “Detect” function to identify technologies, policies, practices, and strategies that can be used to monitor the network...