Your company is revising its security strategy to better protect its network against cyber threats. As a security analyst, you have been tasked with selecting appropriate controls that would actively identify and log security breaches in real-time. Which type of control should you implement to fulfill this requirement?
Detective controls are designed to identify and record incidents as they occur, which helps in analyzing and understanding the threats that the organization faces. Intrusion detection systems (IDS) are a specific example of a detective control which monitors network traffic for suspicious activity and security breaches in real-time.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Intrusion Detection System (IDS)?
Open an interactive chat with Bash
How does an IDS differ from a firewall?
Open an interactive chat with Bash
What are some other examples of detective controls?