Information Security Monitoring Tools and Techniques
In this chapter, you will learn about the methods, tools, and techniques for monitoring information security. You will explore the technical aspects of firewall implementation and understand the functions of intrusion prevention systems (IPSs) and intrusion detection systems (IDSs). You will also discover some important aspects of digital signatures, public key infrastructure (PKI), and asymmetric encryption, which are very important from the CISM exam perspective.
The following topics will be covered in this chapter:
- Firewall Types and Implementations
- Intrusion Detection Systems and Intrusion Prevention Systems
- Digital Signatures
- Elements of Public Key Infrastructure
- Cryptography
- Penetration Testing