Now that we have covered various threats and vulnerabilities in depth, we will take a closer looks at the types of protections and best practices available to deter attacks and mitigate the damage they can inflict. This section will cover the following topics:
- Manual bypassing of electronic controls
- Monitoring system logs
- Physical security
- Port security
- Security posture
- Detection controls versus prevention controls
Manual Bypassing of Electronic Controls
Electronic controls for adding physical security can include such devices as card . . .
The content below this message is for members only.