Topic 2: Real-Time Protection:
Using your knowledge from Internet research, and the course references, discuss real-time protection. Also discuss how a system administrator or security monitoring system might detect that real-time protection has been turned off.
Here is my E-book: Sheward, M. (2018). Hands-on incident response and digital forensics. BCS.
Here is some extra references:
Hands-on Incident Response and Digital Forensics, by Mike Sheward, in the Library. You can access the text through the Library portal.
Chapter 3: “The Incident Response Process”
In NIST Special Publication 800-83 Revision 1, Guide to Malware Incident Prevention and Handling for Desktops and Laptops, read the following:
Chapter 4, Section 2: “Detection and Analysis”
National Institutes of Standards and Technology (NIST). https://www.nist.gov/
Thank you in advance.
Last Completed Projects
| topic title | academic level | Writer | delivered |
|---|
