Summary
In this chapter, we discussed what security incidents are and why they matter in the context of security monitoring. We then went over the types of security monitoring methods and the technology behind collecting the data necessary for security monitoring. The following chapters will be deep dives into the three types of security monitoring, starting with passive security monitoring in the next chapter.