Security controls available for Operating systems
Week 4 discussion deals with security controls available for Operating systems and more specifically it deals with HIDS and AVs.
Based on your research, what are some of the most common issues with deployment of HIDS in an organization with 1000s of computers?
As far as viruses are concerned, are we fighting a losing battle? Are there too many and is the problem too rampant?
Solution preview for the order on security controls available for Operating systems
APA
368 words