Detection measures are needed to identify computer-related crime -- what is the most reactive way to detect whether...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
a computer crime has been attempted or successfully concluded?
It can be the use of a lot of tools but, the first step is to prioritize your key assets and track the highest priority resource for protection first. This tracking could include a variety of tools such as logs, IDS, data integrity checking, firewall intercepts, etc. Use your security policy, vulnerability analysis, etc. to develop a proactive and a reactive policy. There is no silver bullet here.
Editor's note: Do you agree with this expert's response? If you have more to share, post it in one of our .bphAaR2qhqA^0@/searchstorage>discussion forums.
Dig Deeper on Secure data storage
Related Q&A from Vijay Ahuja
Security expert Vijay Ahuja outlines the top five security questions to ask storage vendors before making a purchase.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.